1993-05-17 - Double encryption

Header Data

From: poier@sfu.ca (na-Baron Feyd-Rautha Harkonnen)
To: cypherpunks@toad.com
Message Hash: 0300a8ff93c0356f3a8254e81aa8120a783447130addae77c5652386bdf0ca8c
Message ID: <9305170537.AA17406@malibu.sfu.ca>
Reply To: N/A
UTC Datetime: 1993-05-17 05:37:55 UTC
Raw Date: Sun, 16 May 93 22:37:55 PDT

Raw message

From: poier@sfu.ca (na-Baron Feyd-Rautha Harkonnen)
Date: Sun, 16 May 93 22:37:55 PDT
To: cypherpunks@toad.com
Subject: Double encryption
Message-ID: <9305170537.AA17406@malibu.sfu.ca>
MIME-Version: 1.0
Content-Type: text/plain


Hi.

Being the security freak that I am, even with military grade encryption (for
whatever THATS worth) I feel a little insecure, as most routines are, as far
as I can tell, still succeptable to at the least brute force attacks. I was
wondering: how to cracking programs determine that they have successfully
decrypted a file? Does it simply look for english text (or file headers etc)?
If so, how about double-encrypting a file with two completely different and
very complex programs? Then, even if it did get the first, it couldn't tell
because the resulting data would still be largely gobbledegook.

Probably a stupid question, but I was curious.
Skye
--
"Thppt bwach oop ack" - Bill the Cat | -----====> Skye Merlin Poier <====-----
PGP Public Key available on request  | Undergrad in CMPT/MATH (Virtual Reality)
!!!!!!! FIGHT CLIPPER / LEEF !!!!!!! |          email: poier@sfu.ca





Thread