1994-12-07 - Breaking the NSA

Header Data

From: Tony.Gurnick@nzdairy.co.nz (DNA)
To: cypherpunks@toad.com
Message Hash: 151649fcb313551747a104b5d604acd77e62d4484acd75f4bb5cf8ab994eec89
Message ID: <94120811311055@nzdairy.co.nz>
Reply To: N/A
UTC Datetime: 1994-12-07 22:44:14 UTC
Raw Date: Wed, 7 Dec 94 14:44:14 PST

Raw message

From: Tony.Gurnick@nzdairy.co.nz (DNA)
Date: Wed, 7 Dec 94 14:44:14 PST
To: cypherpunks@toad.com
Subject: Breaking the NSA
Message-ID: <94120811311055@nzdairy.co.nz>
MIME-Version: 1.0
Content-Type: text/plain


If you really want to test NSA.  Encrypt some crypto code
with pgp in an overseas public key(IE: non-us) then email the
code to someone out of the us.  This way you will find out 1 of 2
things.
       1.  That pgp is unbreakable by the NSA
          - Rsa with fairly log keys take so much work the nsa
            cant crack it with huge computers.  This is a good
            thing

          - Idea, even though it is new, is a secure algorithm
            for the above reasons

          - You wont get in trouble as you are only sending
            random bits out of the country not code

       2.  PGP is BREAKABLE by the NSA (OUCH!)
          - You get in deep shit!


      or

       3. PGP is breakable by the NSA but they dont tell anyone! (HMMM)

	  - Well this would be an interesting one!

	  - Since they are the ones that imposed the ITAR rule in the
            first place (them or the us gov) they have a prob!  If
            they knew you were exporting crypto because they cracked
            pgp they could not convict you as that would imply they cracked
            pgp and they would tell the whole world what they can &
            cannot crack.  It would be a big bummer for RSA and IDEA
	    but at least we`d know!


			T





Thread