From: solman@MIT.EDU
To: cypherpunks@toad.com
Message Hash: 6d4f6a5599cf547dfb34f3fba147e29ce4722ff9f7a6191b4ae52d79d1bbf64e
Message ID: <9512021931.AA01944@ua.MIT.EDU>
Reply To: N/A
UTC Datetime: 1995-12-02 19:48:06 UTC
Raw Date: Sun, 3 Dec 1995 03:48:06 +0800
From: solman@MIT.EDU
Date: Sun, 3 Dec 1995 03:48:06 +0800
To: cypherpunks@toad.com
Subject: Cypher secure versus computationally unbounded adversary
Message-ID: <9512021931.AA01944@ua.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain
Hi all,
I've just come up with a method for implementing and encryption algorithm
that is absolutely secure from passive attacks by a computationally
unbounded adversary. Is this a new capability, or am I reinventing the
wheel here?
Thanks,
Jason W. Solinsky
Return to December 1995
Return to “solman@MIT.EDU”