From: perry@imsi.com (Perry E. Metzger)
To: cypherpunks@toad.com
Message Hash: 2d0aeeb30966cebd7c1d8ec6e1a14c80699deb56a5b4bd58309a3109178701f8
Message ID: <9406021734.AA16072@webster.imsi.com>
Reply To: N/A
UTC Datetime: 1994-06-02 17:34:12 UTC
Raw Date: Thu, 2 Jun 94 10:34:12 PDT
From: perry@imsi.com (Perry E. Metzger)
Date: Thu, 2 Jun 94 10:34:12 PDT
To: cypherpunks@toad.com
Subject: what I can say...
Message-ID: <9406021734.AA16072@webster.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain
Having seen Matt's paper, and having been asked by him not to
distribute it, I feel somewhat obligated not to give any details. The
complete method can actually be determined from the newspaper article
(which was astonishingly lucid, all things considered) but having been
"mentally contaminated" its not ethical for me to describe
it. However, I'll say this.
1) He found a beautiful little defect -- it can be explained in a
couple of lines, and it seems obvious, but somehow no one but Matt
saw it. Its a classic -- he deserves lots of kudos. It permits full
interoperability between a "rogue" Tessera user and a
non-rogue user.
2) Its likely that a redesign of the EES (escrowed encryption
standard) could avoid this defect. Whether it could avoid all
defects is, of course, unknowable -- but the current design is
simply flawed and does not truly achieve its stated goal.
3) If the NSA actually worked for years designing this thing, someone
wasn't thinking.
Perry
Return to June 1994
Return to “perry@imsi.com (Perry E. Metzger)”
1994-06-02 (Thu, 2 Jun 94 10:34:12 PDT) - what I can say… - perry@imsi.com (Perry E. Metzger)