From: Eli Brandt <ebrandt@jarthur.cs.hmc.edu>
To: cypherpunks list <cypherpunks@toad.com>
Message Hash: 823bee4f7be5ce24946544b1487112342bbe4e864e228336e1d052ff38f1506d
Message ID: <9405280544.AA01300@toad.com>
Reply To: <m0q7Dbb-0003paC@jpplap>
UTC Datetime: 1994-05-28 05:44:40 UTC
Raw Date: Fri, 27 May 94 22:44:40 PDT
From: Eli Brandt <ebrandt@jarthur.cs.hmc.edu>
Date: Fri, 27 May 94 22:44:40 PDT
To: cypherpunks list <cypherpunks@toad.com>
Subject: Re: (fwd) Re: NSA Helped Yeltsin Foil 1991 Coup
In-Reply-To: <m0q7Dbb-0003paC@jpplap>
Message-ID: <9405280544.AA01300@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Jay said:
> It requires computing one extra xor per block.
Plus a truckload of good random numbers. To do it right, a hardware
RNG is in order. A PRNG really makes no sense, because if you
have a PRNG that strong, why not just use it as a stream cipher?
> that the actual increase in bandwidth for a three cypher system
> threshold in a practical encryption package like PGP would not be 2 to
> 1 since it likely compresses before encryption.)
To be fair, you need to compare compressed-and-split with
compressed-only. This *is* going to be a factor-of-3 size hit.
Eli ebrandt@hmc.edu
Return to May 1994
Return to “tcmay@netcom.com (Timothy C. May)”