1996-11-02 - Re: Unix User Password File Encryption

Header Data

From: Erp <erp@digiforest.com>
To: “Mark M.” <markm@voicenet.com>
Message Hash: 9d84c3f76ced09e2975d926209e9d0c16678b93bf11d3c39613092fddf533701
Message ID: <Pine.LNX.3.95.961102132046.15853A-100000@digital.digiforest.com>
Reply To: <Pine.LNX.3.95.961102125436.194A-100000@gak.voicenet.com>
UTC Datetime: 1996-11-02 20:35:53 UTC
Raw Date: Sat, 2 Nov 1996 12:35:53 -0800 (PST)

Raw message

From: Erp <erp@digiforest.com>
Date: Sat, 2 Nov 1996 12:35:53 -0800 (PST)
To: "Mark M." <markm@voicenet.com>
Subject: Re: Unix User Password File Encryption
In-Reply-To: <Pine.LNX.3.95.961102125436.194A-100000@gak.voicenet.com>
Message-ID: <Pine.LNX.3.95.961102132046.15853A-100000@digital.digiforest.com>
MIME-Version: 1.0
Content-Type: text/plain



**what I said deleted**
> 
> There aren't any known patterns that can be exploited.  The output of DES
> encryption 25 times generates pseudo-random output.  If a pattern did exist,
> cryptanalysis of DES would be very easy.
> 
> Mark

But But But *laugh* ---  Ok, here is my only straw in this lousy bushel of
confusion >) ---  What about a Fuzzy Pattern?  ----  Ya I know, that is a
pretty big staw...  The thought of it is fuzzy, let alone a fuzzy pattern.

I've done a lot of reading on Fuzzy Sets and Fuzzy Logic in general..  I
see how it could work 'maybe' But, yes it is a very indefinite field..  To
many people don't believe in its possible existance...
Ok --  Any replys would be nice thanks bye.






Thread