1996-05-23 - Re: Layman’s explanation for limits on escrowed encryption …

Header Data

From: Mike Fletcher <fletch@ain.bls.com>
To: cypherpunks@toad.com
Message Hash: a4cf2f0a9243cf6b4a4b942b75299e1d64b6dc21767ff7b0e10933592870c739
Message ID: <9605230303.AA17239@outland.ain_dev>
Reply To: <199605230053.RAA28116@ohio.chromatic.com>
UTC Datetime: 1996-05-23 07:24:34 UTC
Raw Date: Thu, 23 May 1996 15:24:34 +0800

Raw message

From: Mike Fletcher <fletch@ain.bls.com>
Date: Thu, 23 May 1996 15:24:34 +0800
To: cypherpunks@toad.com
Subject: Re: Layman's explanation for limits on escrowed encryption ...
In-Reply-To: <199605230053.RAA28116@ohio.chromatic.com>
Message-ID: <9605230303.AA17239@outland.ain_dev>
MIME-Version: 1.0
Content-Type: text/plain


> Could someone with some knowledge of NSA/DoS/FBI intentions please
> explain why key length limitations are necessary for escrowed
> encryption?

	Obviously it's so they can keep feeding international traffic
through the [Insert fav TLA here]'s 64-bit cracking machines.

	.5 * :), of course.  (Is this an acceptable use for floating
point :).

---
Fletch                                                     __`'/|
fletch@ain.bls.com  "Lisa, in this house we obey the       \ o.O'    ______
404 713-0414(w)      Laws of Thermodynamics!" H. Simpson   =(___)= -| Ack. |
404 315-7264(h) PGP Print: 8D8736A8FC59B2E6 8E675B341E378E43  U      ------





Thread