1994-05-28 - Re: (fwd) Re: NSA Helped Yeltsin Foil 1991 Coup

Header Data

From: Eli Brandt <ebrandt@jarthur.cs.hmc.edu>
To: cypherpunks list <cypherpunks@toad.com>
Message Hash: 823bee4f7be5ce24946544b1487112342bbe4e864e228336e1d052ff38f1506d
Message ID: <9405280544.AA01300@toad.com>
Reply To: <m0q7Dbb-0003paC@jpplap>
UTC Datetime: 1994-05-28 05:44:40 UTC
Raw Date: Fri, 27 May 94 22:44:40 PDT

Raw message

From: Eli Brandt <ebrandt@jarthur.cs.hmc.edu>
Date: Fri, 27 May 94 22:44:40 PDT
To: cypherpunks list <cypherpunks@toad.com>
Subject: Re: (fwd) Re: NSA Helped Yeltsin Foil 1991 Coup
In-Reply-To: <m0q7Dbb-0003paC@jpplap>
Message-ID: <9405280544.AA01300@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Jay said:
> It requires computing one extra xor per block.

Plus a truckload of good random numbers.  To do it right, a hardware
RNG is in order.  A PRNG really makes no sense, because if you
have a PRNG that strong, why not just use it as a stream cipher?

> that the actual increase in bandwidth for a three cypher system
> threshold in a practical encryption package like PGP would not be 2 to
> 1 since it likely compresses before encryption.)

To be fair, you need to compare compressed-and-split with
compressed-only.  This *is* going to be a factor-of-3 size hit.

   Eli   ebrandt@hmc.edu






Thread