1994-12-08 - Re: Breaking the NSA

Header Data

From: jrochkin@cs.oberlin.edu (Jonathan Rochkind)
To: cypherpunks@toad.com
Message Hash: 82222d4688738578cb2e4fe0a069c4c74663c35a423ed205cbf337009b8e2cc6
Message ID: <ab0bfdab08021004a30b@[132.162.201.201]>
Reply To: N/A
UTC Datetime: 1994-12-08 00:02:42 UTC
Raw Date: Wed, 7 Dec 94 16:02:42 PST

Raw message

From: jrochkin@cs.oberlin.edu (Jonathan Rochkind)
Date: Wed, 7 Dec 94 16:02:42 PST
To: cypherpunks@toad.com
Subject: Re: Breaking the NSA
Message-ID: <ab0bfdab08021004a30b@[132.162.201.201]>
MIME-Version: 1.0
Content-Type: text/plain


At 6:31 PM 12/07/94, DNA wrote:
>If you really want to test NSA.  Encrypt some crypto code
>with pgp in an overseas public key(IE: non-us) then email the
>code to someone out of the us.  This way you will find out 1 of 2
>things.
>       1.  That pgp is unbreakable by the NSA
>          - Rsa with fairly log keys take so much work the nsa
>            cant crack it with huge computers.  This is a good
>            thing

Nah, no possible result would tell you this. Perhaps PGP is "breakable", in
that it takes something like 30 seconds of their computer time to break,
say.  But even 30 seconds would probably be too much time to spend on
_every_ single piece of email that crosses national borders.







Thread