1995-12-02 - Re: Cypher secure versus computationally unbounded adversary

Header Data

From: solman@MIT.EDU
To: solman@MIT.EDU
Message Hash: c785743807f868da0a6cb9d4d5042bc1982819272cc6028a373ce5ad30864bbe
Message ID: <9512021936.AA01996@ua.MIT.EDU>
Reply To: <9512021931.AA01944@ua.MIT.EDU>
UTC Datetime: 1995-12-02 19:52:21 UTC
Raw Date: Sun, 3 Dec 1995 03:52:21 +0800

Raw message

From: solman@MIT.EDU
Date: Sun, 3 Dec 1995 03:52:21 +0800
To: solman@MIT.EDU
Subject: Re: Cypher secure versus computationally unbounded adversary
In-Reply-To: <9512021931.AA01944@ua.MIT.EDU>
Message-ID: <9512021936.AA01996@ua.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain


What I meant to say, was that the encryption protocol is secure versus
a computationally unbounded passive adversary AND REQUIRES NO PRIOR
COMMUNICATION.

Sorry 'bout that,

Jason W. Solinsky





Thread