From: Karl L. Barrus <barrus@tree.egr.uh.edu>
To: cypherpunks@toad.com
Message Hash: 6e65fa81190be8843b77243d6695437189c0c3bf13196dcd370023ea0fe9714a
Message ID: <9210212044.AA00695@tree.egr.uh.edu>
Reply To: N/A
UTC Datetime: 1992-10-21 20:44:45 UTC
Raw Date: Wed, 21 Oct 92 13:44:45 PDT
From: Karl L. Barrus <barrus@tree.egr.uh.edu>
Date: Wed, 21 Oct 92 13:44:45 PDT
To: cypherpunks@toad.com
Subject: fast elliptical encryption
Message-ID: <9210212044.AA00695@tree.egr.uh.edu>
MIME-Version: 1.0
Content-Type: text/plain
In the winter NeXTWorld magazine, the article ("Tales from the Crypt")
on page 94 mentions various topics of interest: public key encryption,
export restrictions, the role of the NSA, etc. (It's just a one page
article and doesn't go into much depth).
Anyway, NeXTStep 3.0 is bundled with fast elliptical encryption for
NeXTMail. As a result, 3.0 is export restricted.
Does anybody know about the "fast elliptical encryption" public-key
system? How different is it from good ol' RSA? Is it related to the
elliptic-curve factoring algorithm (am I remembering this correctly -
I don't know how elliptic curve factoring works, but I remember seeing
a reference to it somewhere)?
Just curious...
/-----------------------------------\
| Karl L. Barrus |
| barrus@tree.egr.uh.edu (NeXTMail) |
| elee9sf@menudo.uh.edu |
\-----------------------------------/
Return to October 1992
Return to “Karl L. Barrus <barrus@tree.egr.uh.edu>”
1992-10-21 (Wed, 21 Oct 92 13:44:45 PDT) - fast elliptical encryption - Karl L. Barrus <barrus@tree.egr.uh.edu>