From: “Phil G. Fraering” <pgf@srl.cacs.usl.edu>
To: hfinney@shell.portal.com
Message Hash: 557241ad8c22a4efec711a6bf301355069a47d011406b95b1988a68144b4afb7
Message ID: <199404192259.AA17531@srl03.cacs.usl.edu>
Reply To: N/A
UTC Datetime: 1994-04-19 23:04:18 UTC
Raw Date: Tue, 19 Apr 94 16:04:18 PDT
From: "Phil G. Fraering" <pgf@srl.cacs.usl.edu>
Date: Tue, 19 Apr 94 16:04:18 PDT
To: hfinney@shell.portal.com
Subject: Re: Press Release on Secure NCSA Mosiac
Message-ID: <199404192259.AA17531@srl03.cacs.usl.edu>
MIME-Version: 1.0
Content-Type: text/plain
Another question entirely:
Might it be better just to use some sort of stream cypher that
works by XOR'ing the stream against a large one-time pad where
the used parts are deleted as it goes along? I'm thinking currently
of telnet-level applications or larger-level ones based on telnet
like HTTP (I know, technically there are better descriptions of HTTP
and the like).
It would be easy to pre-distribute the one-time pads via PGP or
RSA. This has the advantage of not locking the whole infrastructure
into a single public key system.
Phil
Return to April 1994
Return to ““Phil G. Fraering” <pgf@srl.cacs.usl.edu>”
1994-04-19 (Tue, 19 Apr 94 16:04:18 PDT) - Re: Press Release on Secure NCSA Mosiac - “Phil G. Fraering” <pgf@srl.cacs.usl.edu>