1993-03-11 - CYPHER: Plain encypher

Header Data

From: Matthew J Miszewski <MJMISKI@macc.wisc.edu>
To: cypherpunks@toad.com
Message Hash: ab6aaaa3a030f5bd3d8d64d3253fb9bea94074a97e3b74e168ce18c439dfdbd9
Message ID: <23031112170179@vms2.macc.wisc.edu>
Reply To: N/A
UTC Datetime: 1993-03-11 18:20:38 UTC
Raw Date: Thu, 11 Mar 93 10:20:38 PST

Raw message

From: Matthew J Miszewski <MJMISKI@macc.wisc.edu>
Date: Thu, 11 Mar 93 10:20:38 PST
To: cypherpunks@toad.com
Subject: CYPHER: Plain encypher
Message-ID: <23031112170179@vms2.macc.wisc.edu>
MIME-Version: 1.0
Content-Type: text/plain


 
  In response to all those interested in disguising messages
in complicated graphics/sound/random # generators/etc I believe
this would unnecessarily defeat the purpose.
 
  TLA types become suspicious when they see random pgp type
data transmissions flying across their screens.  When they get
one of these monsters, they of course attempt to decrypt it
(assuming its from someone they wish to monitor (All of us?).
 
  They also become suspicious when incredibly long plain text
transmissions are broadcast.  It seems desireable to have a mode
of encryption that will encrypt my message and then package it
in a short (relatively) plain text message.
 
  The NSA/CIA/FBI wont bother trying to decrypt messages that
are the equivalent of 'My slide show of my trip to Florida".
And even if they were to suspect, or by some miracle decrypt it,
you have your Plausible Deniability.  Make the message generator
sufficiently general that all final messages are plausible real
messages.
 
  Only those expecting a message that is encrypted in plain text will
know they have one.  They would have the key to decrypt it.  And
no one would be the wiser.
 
Matt           mjmiski@macc.wisc.edu
 





Thread