From: J. Michael Diehl <mdiehl@triton.unm.edu>
To: pmetzger@lehman.com
Message Hash: 90fc524101ca0bdabd04f652f74d3c91448f8a886615009e6c5ba0f35c1829b8
Message ID: <9307130441.AA24227@triton.unm.edu>
Reply To: <9307130306.AA15377@snark.shearson.com>
UTC Datetime: 1993-07-13 04:42:01 UTC
Raw Date: Mon, 12 Jul 93 21:42:01 PDT
From: J. Michael Diehl <mdiehl@triton.unm.edu>
Date: Mon, 12 Jul 93 21:42:01 PDT
To: pmetzger@lehman.com
Subject: Re: xor data hiding?
In-Reply-To: <9307130306.AA15377@snark.shearson.com>
Message-ID: <9307130441.AA24227@triton.unm.edu>
MIME-Version: 1.0
Content-Type: text/plain
According to Perry E. Metzger:
> Sadly, the Friedmans already cracked the "multiple repeating xored
> keys" cypher a while back -- about fifty years ago.
I knew it was crackable. That wasn't the point. The point was data hiding.
> Don't be embarassed, by the way -- everyone comes up with cyphers that
> have been cracked before. However, I would suggest reading "The
> Codebreakers" and the current literature before proposing new systems.
I'm not embarassed; I didn't develope the crypto I was discussing. I was simply
discussing a new application for it. I will read Codebreakers.
Thanx.
+-----------------------+-----------------------------+---------+
| J. Michael Diehl ;-) | I thought I was wrong once. | PGP KEY |
| mdiehl@triton.unm.edu | But, I was mistaken. |available|
| mike.diehl@fido.org | | Ask Me! |
| (505) 299-2282 +-----------------------------+---------+
| |
+------"I'm just looking for the opportunity to be -------------+
| Politically Incorrect!" <Me> |
+-----If codes are outlawed, only criminals wil have codes.-----+
+----Is Big Brother in your phone? If you don't know, ask me---+
Return to July 1993
Return to ““Perry E. Metzger” <pmetzger@lehman.com>”