1994-03-03 - Re: Need info on Encyption book

Header Data

From: Matthew J Ghio <mg5n+@andrew.cmu.edu>
To: cypherpunks@toad.com
Message Hash: fa951fc5e1394bcf90b4e988f62c003d6ec79ccd8944a0f47ba094a5924f904e
Message ID: <IhRWSDK00awNF0hEU4@andrew.cmu.edu>
Reply To: <9403031603.AA13543@toad.com>
UTC Datetime: 1994-03-03 18:09:43 UTC
Raw Date: Thu, 3 Mar 94 10:09:43 PST

Raw message

From: Matthew J Ghio <mg5n+@andrew.cmu.edu>
Date: Thu, 3 Mar 94 10:09:43 PST
To: cypherpunks@toad.com
Subject: Re: Need info on Encyption book
In-Reply-To: <9403031603.AA13543@toad.com>
Message-ID: <IhRWSDK00awNF0hEU4@andrew.cmu.edu>
MIME-Version: 1.0
Content-Type: text/plain


> You'll learn how to protect your communications with
> techiques for transposing characters in text, replacing
> characters, with new ones, using arrays, and more.

Haha... sounds more like "How to encrypt messages so that prying eyes
can read them too."

Character substitution?  You'll need to do a lot better than that to
beat cryptanalysis.  A simple character substitution array wouldn't fool
most people on this list if they took a serious crack at it.





Thread