1998-12-30 - Re: distribution scheme

Header Data

From: jeradonah@juno.com (jeradonah lives)
To: cypherpunks@cyberpass.net
Message Hash: 61cfd92e84dc200d3b0078129c98353ea558cb2b29767da6d55cde3184672af3
Message ID: <19981230.174514.4551.8.jeradonah@juno.com>
Reply To: <199812301314.OAA10146@replay.com>
UTC Datetime: 1998-12-30 23:15:05 UTC
Raw Date: Thu, 31 Dec 1998 07:15:05 +0800

Raw message

From: jeradonah@juno.com (jeradonah lives)
Date: Thu, 31 Dec 1998 07:15:05 +0800
To: cypherpunks@cyberpass.net
Subject: Re: distribution scheme
In-Reply-To: <199812301314.OAA10146@replay.com>
Message-ID: <19981230.174514.4551.8.jeradonah@juno.com>
MIME-Version: 1.0
Content-Type: text/plain




On Wed, 30 Dec 1998 14:14:19 +0100 Anonymous <nobody@replay.com> writes:
>
>>>Falcon, aka FitugMix, wrote about a suggestion to chop crypto or 
>>>other contraband material into separate streams, e.g. bit 1 of each 
>>>byte in stream 1, etc., hoping that this would be "legal" because it's

>>>not really encryption, though if managed carefully it would still be 
>>>hard to read.
>
>>this concept is virtually identical to fractal encryption, where a
>>message is chopped into its component parts (25 a's, 3 b's, 8 c's, 
>>and so on) and also chopped into a configuration scheme.  this form 
>>of encryption does fall under the definition of munitions by the u.s.
>>government...
>
>yes, I found that out in the meantime. the legal aspect falls short
>of my expectations. I still consider the scheme to be both simple and
>useful 

fractal encryption is a simple concept.  however, testing of various
methods proved that the key was the "pattern recognition" element. 
because this part is sent separately from the alphanumeric element, the
cipher itself is as secure as imaginable.  only if someone captures both
elements, is able to understand the combination, and break the pattern
recognition scheme, can the cipher be read...

>I still consider the scheme to be both simple and useful because it 
>actually changes the byte structure, so looking for 'a' or 'e' or
similiar 
>pattern-analysis does not work anymore. 

a non-linear methodology will always defeat traditional (linear)
cryptoanalysis.  but that is precisely the reason that the us government
opposes the development and export of this form of encryption scheme...

ac












___________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com/getjuno.html
or call Juno at (800) 654-JUNO [654-5866]





Thread