From: Simon Spero <ses@tipper.oit.unc.edu>
To: cypherpunks@toad.com
Message Hash: 0259bbb5c7a7287cb954e844cae8e70246726aa286dab100303e77b84db1de84
Message ID: <Pine.SOL.3.91.951026115444.19935B-100000@chivalry>
Reply To: N/A
UTC Datetime: 1995-10-27 03:11:13 UTC
Raw Date: Fri, 27 Oct 1995 11:11:13 +0800
From: Simon Spero <ses@tipper.oit.unc.edu>
Date: Fri, 27 Oct 1995 11:11:13 +0800
To: cypherpunks@toad.com
Subject: MD5 and ITAR questions
Message-ID: <Pine.SOL.3.91.951026115444.19935B-100000@chivalry>
MIME-Version: 1.0
Content-Type: text/plain
I can't remember the exact details, so could someone give me a quick
refresher- which of the following are considered ok under ITAR?
MD5 as a checksum
keyed MD5 for authentication
keyed MD5 as a stream cypher
Thanks
Simon
---
(defun modexpt (x y n) "computes (x^y) mod n"
(cond ((= y 0) 1) ((= y 1) (mod x n))
((evenp y) (mod (expt (modexpt x (/ y 2) n) 2) n))
(t (mod (* x (modexpt x (1- y) n)) n))))
Return to October 1995
Return to “Simon Spero <ses@tipper.oit.unc.edu>”
1995-10-27 (Fri, 27 Oct 1995 11:11:13 +0800) - MD5 and ITAR questions - Simon Spero <ses@tipper.oit.unc.edu>