1993-06-24 - crypto pklite

Header Data

From: Douglas Sinclair <dsinclai@acs.ucalgary.ca>
To: karn@qualcomm.com (Phil Karn)
Message Hash: 378d843d65198f28e4453b735e722b7a47b7a0c17f013ee11caf639e6266314d
Message ID: <9306240247.AA16249@acs1.acs.ucalgary.ca>
Reply To: <9306240119.AA00555@servo>
UTC Datetime: 1993-06-24 02:49:00 UTC
Raw Date: Wed, 23 Jun 93 19:49:00 PDT

Raw message

From: Douglas Sinclair <dsinclai@acs.ucalgary.ca>
Date: Wed, 23 Jun 93 19:49:00 PDT
To: karn@qualcomm.com (Phil Karn)
Subject: crypto pklite
In-Reply-To: <9306240119.AA00555@servo>
Message-ID: <9306240247.AA16249@acs1.acs.ucalgary.ca>
MIME-Version: 1.0
Content-Type: text/plain


I have a friend who wrote a gadget called EXELOCK.  It will throw
a password stub into the front of an of an EXE file.  Now, I'm sure
it doesn't use encryption but just compares the hash of the password to
a stored value.  However, I'm sure an IDEA or DES version could be implemented. 
As for compression, no need to re-invent the wheel.  Simply run pklite
and then run the new EXELOCK on the result.

I'll contact this person and see if I can lay my hands on the  source
code for the gadget.
-- 
PGP 2.2 Key by finger





Thread