From: Bill Sommerfeld <sommerfeld@orchard.medford.ma.us>
To: jamesd@netcom.com (James A. Donald)
Message Hash: 8d48f455b367445dcba2c8719174e4f79320e303c243979041d9b27ff6908521
Message ID: <199410032258.SAA00831@orchard.medford.ma.us>
Reply To: <199410030328.UAA23919@netcom8.netcom.com>
UTC Datetime: 1994-10-03 23:08:43 UTC
Raw Date: Mon, 3 Oct 94 16:08:43 PDT
From: Bill Sommerfeld <sommerfeld@orchard.medford.ma.us>
Date: Mon, 3 Oct 94 16:08:43 PDT
To: jamesd@netcom.com (James A. Donald)
Subject: Re: Mandatory Email verification
In-Reply-To: <199410030328.UAA23919@netcom8.netcom.com>
Message-ID: <199410032258.SAA00831@orchard.medford.ma.us>
MIME-Version: 1.0
Content-Type: text/plain
> Ken Landaiche writes
> > I have seen that
> > any system a human can devise, another human can eventually break.
>
> False. Most cryptographic algorithms these days are secure.
Huh? How do you count that? There are dozens of algorithms described
in Schneier; most are described as either being of unknown strength
(due to insufficient cryptanalysis), or broken, or substantially
similar to a broken cipher. Only a few are described as strong.
There's only one unconditionally secure cipher: the true one-time-pad.
> Windows NT is secure.
And pigs can fly, and you have prime development land for sale in
south Florida..
- Bill
Return to October 1994
Return to “mccoy@io.com (Jim McCoy)”