1996-09-11 - No Subject

Header Data

From: scrappo.reverb@juno.com (A L)
To: cypherpunks@toad.com
Message Hash: 21a9684d58c19a69c964fb8ad1feb26e20ed62fb2fc82ca20d9d56ee725c9b00
Message ID: <19960910.225608.8159.0.scrappo.reverb@juno.com>
Reply To: N/A
UTC Datetime: 1996-09-11 10:29:28 UTC
Raw Date: Wed, 11 Sep 1996 18:29:28 +0800

Raw message

From: scrappo.reverb@juno.com (A L)
Date: Wed, 11 Sep 1996 18:29:28 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19960910.225608.8159.0.scrappo.reverb@juno.com>
MIME-Version: 1.0
Content-Type: text/plain


I apologize for any behavior on behalf of my domain name.
(A little background:)
I am a cryptographer hopeful. I was interested in such
things as the Caesar Cypher and the Enigma machine and the
Roman encryption "padlock" when other kids were more
interested in how the water fountain shot water straight up. 
After some thought and a little writing, I developed 
an encryption program using Mallard Basic on an old
Amstrad (which I still grudgingly keep) with programming 
skills I taught myself.
 I know most of the basics regarding RSA, PGP, and 
assorted single pass (?) cyphers. One thing I do not 
understand has to do with how RSA sieves large primes, 
etc. That is one of the few things that I do not 
understand about RSA. Another aspect of RSA I do not 
understand is the usage of primes (or any number) in the 
actual encryption process. Does the program add numbers 
from the key to the plaintext to create the cyphertext, or 
does it use some other process.
I am sorry if any of these questions seem redundant and/or
stupid, but at this point in time, I can't get my hands on 
any actual explanation for how it works. (I would get a
copy of "Applied Cryptography," but I do not have any
source of income, which also explains Juno.)
Aiieee!!! the dreaded "J" word!
Once again, I apologize if any of this caused annoyance
or sickness.





Thread