1992-10-21 - fast elliptical encryption

Header Data

From: Karl L. Barrus <barrus@tree.egr.uh.edu>
To: cypherpunks@toad.com
Message Hash: 6e65fa81190be8843b77243d6695437189c0c3bf13196dcd370023ea0fe9714a
Message ID: <9210212044.AA00695@tree.egr.uh.edu>
Reply To: N/A
UTC Datetime: 1992-10-21 20:44:45 UTC
Raw Date: Wed, 21 Oct 92 13:44:45 PDT

Raw message

From: Karl L. Barrus <barrus@tree.egr.uh.edu>
Date: Wed, 21 Oct 92 13:44:45 PDT
To: cypherpunks@toad.com
Subject: fast elliptical encryption
Message-ID: <9210212044.AA00695@tree.egr.uh.edu>
MIME-Version: 1.0
Content-Type: text/plain



In the winter NeXTWorld magazine, the article ("Tales from the Crypt")
on page 94 mentions various topics of interest: public key encryption,
export restrictions, the role of the NSA, etc.  (It's just a one page
article and doesn't go into much depth).

Anyway, NeXTStep 3.0 is bundled with fast elliptical encryption for
NeXTMail.  As a result, 3.0 is export restricted.

Does anybody know about the "fast elliptical encryption" public-key
system?  How different is it from good ol' RSA?  Is it related to the
elliptic-curve factoring algorithm (am I remembering this correctly -
I don't know how elliptic curve factoring works, but I remember seeing
a reference to it somewhere)?

Just curious...

/-----------------------------------\
| Karl L. Barrus                    |
| barrus@tree.egr.uh.edu (NeXTMail) |
| elee9sf@menudo.uh.edu             |
\-----------------------------------/





Thread