1998-12-16 - Re: WEAK3-EX – A Layman’s 56-bit Data Encryption Algorithm

Header Data

From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: Ben Laurie <ben@algroup.co.uk>
Message Hash: 57ff4fef6e31025fe3c929093385b43cbe6662709b1a80bfbaf3a11217ef42fe
Message ID: <367769EF.251F7294@stud.uni-muenchen.de>
Reply To: <3676B5B3.E37D80C@stud.uni-muenchen.de>
UTC Datetime: 1998-12-16 08:33:49 UTC
Raw Date: Wed, 16 Dec 1998 16:33:49 +0800

Raw message

From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 16 Dec 1998 16:33:49 +0800
To: Ben Laurie <ben@algroup.co.uk>
Subject: Re: WEAK3-EX -- A Layman's 56-bit Data Encryption Algorithm
In-Reply-To: <3676B5B3.E37D80C@stud.uni-muenchen.de>
Message-ID: <367769EF.251F7294@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



Ben Laurie wrote:
> 
> Mok-Kong Shen wrote:
> > P.S. For space and obvious reasons, I plan to remove the code and
> > binaries of WEAK1, WEAK2, WEAK3 and WEAK3-E from my Web page this
> > Friday, leaving in future WEAK3-EX the single encryption software
> > accessible.
> 
> Hmm. The "obvious reasons" being one or more of the following:
> 
> a) You think people shouldn't be allowed strong crypto
> b) You think the US shouldn't have to go to the trouble of getting laws
> changed, we should just obey their whims voluntarily
> c) You are on the NSA's payroll

I didn't want to incur two matters (hence my way of formulation):

1. The law would sometime be effective in my country without my
   immediately noticing it and I'll get trobles.

2. I am not sure that my stuff is really strong. Saying that I
   have to delete because it is strong is claiming something
   at least very subjectively and anyway not scientific.

Do you understand now?

M. K. Shen





Thread