From: Ben.Goren@asu.edu
To: NetSurfer <cypherpunks@toad.com
Message Hash: f84f3eec10341b632479a48350bc14d918714e671ea11e13a6f47f2725e5f329
Message ID: <9406161906.AA03059@Tux.Music.ASU.Edu>
Reply To: N/A
UTC Datetime: 1994-06-16 19:21:09 UTC
Raw Date: Thu, 16 Jun 94 12:21:09 PDT
From: Ben.Goren@asu.edu
Date: Thu, 16 Jun 94 12:21:09 PDT
To: NetSurfer <cypherpunks@toad.com
Subject: Re: Unofficial Excerpt from InfoSecurity News
Message-ID: <9406161906.AA03059@Tux.Music.ASU.Edu>
MIME-Version: 1.0
Content-Type: text/plain
>[. . .]
>The underlying purpose of this
>control is not just to facilitate court-approved
>wire taps, but also to discourage criminals
>and foreign entities from using Clipper/Skipjack
>technology. This control mechanism would force
>them to use other, less powerful, algorithms
>and key management.
>[. . . .]
>Donn B. Parker.
>dparker@sri.com
How can he breathe when his head is so far in the sand?
I've not seen one shred of evidence that Skipjack is strong--Ms. Denning's
statements are not evidence--and there're plenty of indications that triple
DES and IDEA are both unbreakable for the near future, at least.
That's an awfully arrogant position for code that's already leaking before
widespread dissemination (LEAF attack), let alone real analysis.
b&
--
Ben.Goren@asu.edu, Arizona State University School of Music
net.proselytizing (write for info): Protect your privacy; oppose Clipper.
Voice concern over proposed Internet pricing schemes. Stamp out spamming.
Finger ben@tux.music.asu.edu for PGP 2.3a public key.
Return to June 1994
Return to “NetSurfer <jdwilson@gold.chem.hawaii.edu>”