1996-08-27 - Re: The POOCH

Header Data

From: Gary Howland <gary@systemics.com>
To: cypherpunks@toad.com
Message Hash: 1cdceb0380ba1c8df5662596e6b7618242b82e9320d47aef8c14c8066d057428
Message ID: <3222E9E9.237C228A@systemics.com>
Reply To: <960826234448_76473.1732_BHT119-3@CompuServe.COM>
UTC Datetime: 1996-08-27 15:05:02 UTC
Raw Date: Tue, 27 Aug 1996 23:05:02 +0800

Raw message

From: Gary Howland <gary@systemics.com>
Date: Tue, 27 Aug 1996 23:05:02 +0800
To: cypherpunks@toad.com
Subject: Re: The POOCH
In-Reply-To: <960826234448_76473.1732_BHT119-3@CompuServe.COM>
Message-ID: <3222E9E9.237C228A@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain


JOHN E. HOLT wrote:
> 
> The Pouch uses a 64 x 64 block product cipher, a 1024 bit random initialization
> vector and the CBC technique.  Most experts agree that such an implementation
> is highly resistant to all forms of cryptographic attack.
                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Wow!  Resistant to those not invented yet - I guess this means one of
two things - the pooch is a OTP, or Mr. Holt has a time machine.

> Hellman and Dilfie rely on knowing the algorithm for their known plain text attacks

> An unpublished algorithm forces them into reverse engineering the computer
> programs to learn the algorithm. The POUCH has many roadblocks built in
> to prevent this.

Wow! (again).  Dongleless protection!  I'm impressed.  Now we don't need
tamper resistant smart cards - we can do it all in software!

Gary
--
pub  1024/C001D00D 1996/01/22  Gary Howland <gary@systemics.com>
Key fingerprint =  0C FB 60 61 4D 3B 24 7D  1C 89 1D BE 1F EE 09 06 
^S
^A^Aoft FAT filesytem is extremely robust, ^Mrarely suffering from^T^T





Thread