From: Ben.Goren@asu.edu
To: cypherpunks@toad.com
Message Hash: 52a4d3de9fee4fadc0480b7c945fb0004208cdf9ffee372995e27cd0b5a7b59a
Message ID: <9406180159.AA08164@Tux.Music.ASU.Edu>
Reply To: N/A
UTC Datetime: 1994-06-18 01:58:40 UTC
Raw Date: Fri, 17 Jun 94 18:58:40 PDT
From: Ben.Goren@asu.edu
Date: Fri, 17 Jun 94 18:58:40 PDT
To: cypherpunks@toad.com
Subject: Let us attack Clipper
Message-ID: <9406180159.AA08164@Tux.Music.ASU.Edu>
MIME-Version: 1.0
Content-Type: text/plain
No, not with words, as we're all so fond of doing. Instead, I suggest that
the NSA or others provide free access to an EES system on the 'net, for any
and all to attempt attacks.
They could hook up a workstation or two with a couple Tessera cards, and
provide anonymous login access. All functions should be permitted as they
will be in a final implementation.
This is an inexpensive way that EES advocates can permit access to the
system for analysis. It would be only for research purposes--there'd be no
way to encrypt a phone conversation, and anybody would have to be stupid to
encrypt sensitive data with an NSA-owned machine, even assuming you could
get the data to the computer securely in the first place.
To the NSA agent who is surely subscribed: if Clipper is so great, prove
it. If you won't disclose the Skipjack algorithm (but why not if it's
secure?), at least provide access to test its implementation.
b&
--
Ben.Goren@asu.edu, Arizona State University School of Music
net.proselytizing (write for info): Protect your privacy; oppose Clipper.
Voice concern over proposed Internet pricing schemes. Stamp out spamming.
Finger ben@tux.music.asu.edu for PGP 2.3a public key.
Return to June 1994
Return to “tcmay@netcom.com (Timothy C. May)”