1994-10-03 - Re: Mandatory Email verification

Header Data

From: Bill Sommerfeld <sommerfeld@orchard.medford.ma.us>
To: jamesd@netcom.com (James A. Donald)
Message Hash: 8d48f455b367445dcba2c8719174e4f79320e303c243979041d9b27ff6908521
Message ID: <199410032258.SAA00831@orchard.medford.ma.us>
Reply To: <199410030328.UAA23919@netcom8.netcom.com>
UTC Datetime: 1994-10-03 23:08:43 UTC
Raw Date: Mon, 3 Oct 94 16:08:43 PDT

Raw message

From: Bill Sommerfeld <sommerfeld@orchard.medford.ma.us>
Date: Mon, 3 Oct 94 16:08:43 PDT
To: jamesd@netcom.com (James A. Donald)
Subject: Re: Mandatory Email verification
In-Reply-To: <199410030328.UAA23919@netcom8.netcom.com>
Message-ID: <199410032258.SAA00831@orchard.medford.ma.us>
MIME-Version: 1.0
Content-Type: text/plain


> Ken Landaiche writes
> > I have seen that
> > any system a human can devise, another human can eventually break. 
> 
> False.  Most cryptographic algorithms these days are secure.

Huh?  How do you count that?  There are dozens of algorithms described
in Schneier; most are described as either being of unknown strength
(due to insufficient cryptanalysis), or broken, or substantially
similar to a broken cipher.  Only a few are described as strong.

There's only one unconditionally secure cipher: the true one-time-pad.

> Windows NT is secure.

And pigs can fly, and you have prime development land for sale in
south Florida..

					- Bill






Thread