1993-05-19 - Dolphin Encrypt

Header Data

From: Stanton McCandlish <anton@hydra.unm.edu>
To: cypherpunks@toad.com
Message Hash: de0194a5589c049cdb54463bfa9b1dde80108bc568200604b7675ce0275952bf
Message ID: <9305191239.AA09886@hydra.unm.edu>
Reply To: N/A
UTC Datetime: 1993-05-19 12:39:12 UTC
Raw Date: Wed, 19 May 93 05:39:12 PDT

Raw message

From: Stanton McCandlish <anton@hydra.unm.edu>
Date: Wed, 19 May 93 05:39:12 PDT
To: cypherpunks@toad.com
Subject: Dolphin Encrypt
Message-ID: <9305191239.AA09886@hydra.unm.edu>
MIME-Version: 1.0
Content-Type: text/plain


<tried to email this, but it bounced>

I too would like more info on this subject!  Guess all us yokels at UNM are
clueless or something.  My question is, how does the recipient get the key,
and how do they (she, whatever) know to use that long de command? What would
happend if they didn't, just get gibberish?

> 
> The recipient captures the entire message as, say, G.ENC, then runs:
> 
>                        DE D G.ENC G.DEC /t
> 
> (Of course, she has to know the encryption key.)  Dolphin Encrypt
> skips over P1 to get at C2 and writes G.DEC containing P2.  Voila!
> 
> For further info send me a snailmail address.

See below for snail address...

-- 
Testes saxi solidi!  **********************   Podex opacus gravedinosus est!  
Stanton McCandlish,  SysOp:  Noise in the Void Data Center BBS
IndraNet: 369:1/1      FidoNet: 1:301/2      Internet: anton@hydra.unm.edu
Snail: 8020 Central SE #405, Albuquerque, New Mexico 87108 USA
Data phone: +1-505-246-8515 (24hr, 1200-14400 v32bis, N-8-1)
Vox phone:  +1-505-247-3402 (bps rate varies, depends on if you woke me up...:)





Thread