From: poier@sfu.ca (na-Baron Feyd-Rautha Harkonnen)
To: cypherpunks@toad.com
Message Hash: 0300a8ff93c0356f3a8254e81aa8120a783447130addae77c5652386bdf0ca8c
Message ID: <9305170537.AA17406@malibu.sfu.ca>
Reply To: N/A
UTC Datetime: 1993-05-17 05:37:55 UTC
Raw Date: Sun, 16 May 93 22:37:55 PDT
From: poier@sfu.ca (na-Baron Feyd-Rautha Harkonnen)
Date: Sun, 16 May 93 22:37:55 PDT
To: cypherpunks@toad.com
Subject: Double encryption
Message-ID: <9305170537.AA17406@malibu.sfu.ca>
MIME-Version: 1.0
Content-Type: text/plain
Hi.
Being the security freak that I am, even with military grade encryption (for
whatever THATS worth) I feel a little insecure, as most routines are, as far
as I can tell, still succeptable to at the least brute force attacks. I was
wondering: how to cracking programs determine that they have successfully
decrypted a file? Does it simply look for english text (or file headers etc)?
If so, how about double-encrypting a file with two completely different and
very complex programs? Then, even if it did get the first, it couldn't tell
because the resulting data would still be largely gobbledegook.
Probably a stupid question, but I was curious.
Skye
--
"Thppt bwach oop ack" - Bill the Cat | -----====> Skye Merlin Poier <====-----
PGP Public Key available on request | Undergrad in CMPT/MATH (Virtual Reality)
!!!!!!! FIGHT CLIPPER / LEEF !!!!!!! | email: poier@sfu.ca
Return to May 1993
Return to “poier@sfu.ca (na-Baron Feyd-Rautha Harkonnen)”
1993-05-17 (Sun, 16 May 93 22:37:55 PDT) - Double encryption - poier@sfu.ca (na-Baron Feyd-Rautha Harkonnen)