From: KarL MarX <karlmarx@illumini.demon.co.uk>
To: cypherpunks@toad.com
Message Hash: 410c09544aab008ae6e0a57685f4a5ba370373fb4103085ae0965750fdd4d91d
Message ID: <2@illumini.demon.co.uk>
Reply To: N/A
UTC Datetime: 1996-02-22 14:52:18 UTC
Raw Date: Thu, 22 Feb 1996 22:52:18 +0800
From: KarL MarX <karlmarx@illumini.demon.co.uk>
Date: Thu, 22 Feb 1996 22:52:18 +0800
To: cypherpunks@toad.com
Subject: A Challenge (perhaps!)
Message-ID: <2@illumini.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
Hi!
My friend has just written a new crypto program that he is trying to get
included on a PC Magazine CD-ROM over here...
I don't know too much about it at the moment, but he said he thought it
would be a good idea to see if anyone on this list could crack it and thus
help to make it more secure. I don't know too much about it ATM...
I know it doesn't exercise key technology and relies on the secrecy of the
algorithm (which from my very limited knowledge on cryptography I think makes
it almost doomed from the start (?))... I have some ciphertext of this
application but apart from that I have nothing else... Would anyone have any
objectiosn to this being posted to the list? If not, could someone tell me
what I should post to the list, plaintext and resulting ciphertext, would
that be enough, or shoudl I post some info on the algorithms as well ???
The application is written in Visual Basic and I could probably get a copy
of the compiled (well VB is actually interpreted, but that's neither here or
there) .EXE file....
--
Karl Marx
Return to February 1996
Return to “KarL MarX <karlmarx@illumini.demon.co.uk>”