1993-05-29 - Data Insecurity Packages, etc.

Header Data

From: Eric Hughes <hughes@soda.berkeley.edu>
To: wixer!wixer.bga.com!meyer@cactus.org
Message Hash: ef99edcbb12b0c464658c6e7b82560bc032a277265f510d3616a2b084ecb9600
Message ID: <9305281626.AA12145@soda.berkeley.edu>
Reply To: <9305270314.AA05215@wixer>
UTC Datetime: 1993-05-29 04:39:02 UTC
Raw Date: Fri, 28 May 93 21:39:02 PDT

Raw message

From: Eric Hughes <hughes@soda.berkeley.edu>
Date: Fri, 28 May 93 21:39:02 PDT
To: wixer!wixer.bga.com!meyer@cactus.org
Subject: Data Insecurity Packages, etc.
In-Reply-To: <9305270314.AA05215@wixer>
Message-ID: <9305281626.AA12145@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain


>It has also been examined by four cryptologists (professional and/or
>credentialed) not involved in its development, and it was ridiculed
>by none of them.

I hear the sounds of autonecrothaphty (digging one's own grave).  Was
it recommended by any of them, and did any of the test it?

>The first task of a cryptanalyst
>is to discover what method of encryption was used. 

Usually not.  This often comes as collateral information related to
the intercept.  In the case of a PC seizure, having a manual lying
around and an executable on the disk usually qualifies.

Eric







Thread