1995-10-31 - Cryto article in SJ Mercenary

Header Data

From: Simon Spero <ses@tipper.oit.unc.edu>
To: cypherpunks@toad.com
Message Hash: d8d0223de59e04ba610c27391e18b7f1fc988dd4ffabb3108943626bd328bd5d
Message ID: <Pine.SOL.3.91.951031140028.1151G-100000@chivalry>
Reply To: N/A
UTC Datetime: 1995-10-31 23:11:30 UTC
Raw Date: Wed, 1 Nov 1995 07:11:30 +0800

Raw message

From: Simon Spero <ses@tipper.oit.unc.edu>
Date: Wed, 1 Nov 1995 07:11:30 +0800
To: cypherpunks@toad.com
Subject: Cryto article in SJ Mercenary
Message-ID: <Pine.SOL.3.91.951031140028.1151G-100000@chivalry>
MIME-Version: 1.0
Content-Type: text/plain


There's a full page equivalent article on encyption in today's San Jose
Mercury News (12E-11E). The article concentrates on public key
cryptography, and mixes some good stuff with some silly mistakes. The
first page has about 4/5th of the article devoted to a big diagram showing
how someone using public key encryption to cover a whole message, and sent
it over the internet to someone in Argentina. All this without a mention
of using symmetric cyphers, and without even mentioning ITAR. 

Another 1/8th of this page is given over to a bunch of cypher text that
supposedly encodes the address of "Mr Cosmic Kumquat, SSl Trusters etc.." 
This address looks kind of familiar... but they seem to imply that the 
cyphertext is the output of an RSA encrpytion, not RC4. 

They then go on to discuss factoring, and explain the difference between 
the strength of algorithms in theory, and how Netscape became vulnerable 
due to "beginners mistakes" in the implementation, and how security is 
best assured by open disclosure, not security through obscurity. 

Simon
----
(defun modexpt (x y n)  "computes (x^y) mod n"
  (cond ((= y 0) 1) 	((= y 1) (mod x n))
	((evenp y) (mod (expt (modexpt x (/ y 2) n) 2) n))
	(t (mod (* x (modexpt x (1- y) n)) n))))






Thread