1994-05-27 - Re: (fwd) Re: NSA Helped Yeltsin Foil 1991 Coup

Header Data

From: jpp@jpplap.markv.com (Jay Prime Positive)
To: perry@imsi.com
Message Hash: 826d83539b75d1b16853642a85ca4940a83ac2a19179576717932060aad0a8a2
Message ID: <m0q76Cl-0003paC@jpplap>
Reply To: <9405271821.AA09012@snark.imsi.com>
UTC Datetime: 1994-05-27 19:02:06 UTC
Raw Date: Fri, 27 May 94 12:02:06 PDT

Raw message

From: jpp@jpplap.markv.com (Jay Prime Positive)
Date: Fri, 27 May 94 12:02:06 PDT
To: perry@imsi.com
Subject: Re: (fwd) Re: NSA Helped Yeltsin Foil 1991 Coup
In-Reply-To: <9405271821.AA09012@snark.imsi.com>
Message-ID: <m0q76Cl-0003paC@jpplap>
MIME-Version: 1.0
Content-Type: text/plain

   Date: Fri, 27 May 1994 14:21:28 -0400
   From: "Perry E. Metzger" <perry@imsi.com>

   We are all very dependent on things like MD5 and IDEA, which may or
   may not actually be secure. We should bear this in mind.

If you suspect that some of the non DOD/NSA cyphers might be broken,
but you are not ready to employ one-time-pads, then you should
threshold you mesages into N parts so that all N are needed to recover
the original.  Then encrypt each part under a different cypher.

Perhaps IDEA, and 3DES would be apropriate.  This will not increase
the size of your messages very much since you compress before
encrypting -- don't you?