From: ahupp@primenet.com (Adam Hupp)
To: ylo@cs.hut.fi
Message Hash: 62343891a211d06ce8c9377bfc0839510f3d23c73135667c4ce5620fa8122214
Message ID: <199511212106.OAA22450@usr1.primenet.com>
Reply To: N/A
UTC Datetime: 1995-11-21 21:45:53 UTC
Raw Date: Wed, 22 Nov 1995 05:45:53 +0800
From: ahupp@primenet.com (Adam Hupp)
Date: Wed, 22 Nov 1995 05:45:53 +0800
To: ylo@cs.hut.fi
Subject: Re: NSA, ITAR, NCSA and plug-in hooks.
Message-ID: <199511212106.OAA22450@usr1.primenet.com>
MIME-Version: 1.0
Content-Type: text/plain
>Date: Tue, 21 Nov 1995 02:10:02 +0100
>From: Tatu Ylonen <ylo@cs.hut.fi>
>To: ahupp@primenet.com
>Cc: cypherpunks@toad.com
>Subject: Re: NSA, ITAR, NCSA and plug-in hooks.
>
>> PKZIP allows encryption (other's ?). How about a hook to that?
>
>PKZIP "encryption" is self-deception. A program for cracking it,
>PKCRACK, is widely available on the internet. See e.g.
>ftp.funet.fi:/pub/crypt/analysis.
>
>[For information about internationally available cryptographic
>software, see http://www.cs.hut.fi/crypto.]
>
> Tatu Ylonen <ylo@cs.hut.fi>
PKCRACK uses a dictionary attack. Anyway, my point was that you could use
PKZIP's encryption as an excuse for passing a password.
Return to November 1995
Return to “ahupp@primenet.com (Adam Hupp)”
1995-11-21 (Wed, 22 Nov 1995 05:45:53 +0800) - Re: NSA, ITAR, NCSA and plug-in hooks. - ahupp@primenet.com (Adam Hupp)