1996-01-25 - Re: Crippled Notes export encryption

Header Data

From: Rich Salz <rsalz@osf.org>
To: warlord@MIT.EDU
Message Hash: da6dd16a6c1a8e9f2c711a35ab5e1a543d8200cff69396cabd20debc3881fd1e
Message ID: <9601250008.AA12407@sulphur.osf.org>
Reply To: N/A
UTC Datetime: 1996-01-25 03:27:36 UTC
Raw Date: Thu, 25 Jan 1996 11:27:36 +0800

Raw message

From: Rich Salz <rsalz@osf.org>
Date: Thu, 25 Jan 1996 11:27:36 +0800
To: warlord@MIT.EDU
Subject: Re: Crippled Notes export encryption
Message-ID: <9601250008.AA12407@sulphur.osf.org>
MIME-Version: 1.0
Content-Type: text/plain


>So where exactly do they draw the line?  You can still construct your
>software in such a way that there is a clean boundary between the
>crypto stuff and the rest.

Right.  However, if you call things like "keysize" as oposed to "state"
then they will look askance.

>How exactly are crypto-hooks defined?

On a case-by-case basis.
	/r$





Thread