1996-02-22 - Re: Internet Privacy Guaranteed ad (POTP Jr.)

Header Data

From: “Deranged Mutant” <WlkngOwl@UNiX.asb.com>
To: IPG Sales <ipgsales@cyberstation.net>
Message Hash: b0d102846cc2d2d0f73a7c11351846714de342a19e81b192d54a224c7b03be5e
Message ID: <199602220345.WAA25647@UNiX.asb.com>
Reply To: N/A
UTC Datetime: 1996-02-22 03:38:34 UTC
Raw Date: Wed, 21 Feb 96 19:38:34 PST

Raw message

From: "Deranged Mutant" <WlkngOwl@UNiX.asb.com>
Date: Wed, 21 Feb 96 19:38:34 PST
To: IPG Sales <ipgsales@cyberstation.net>
Subject: Re: Internet Privacy Guaranteed ad (POTP Jr.)
Message-ID: <199602220345.WAA25647@UNiX.asb.com>
MIME-Version: 1.0
Content-Type: text/plain


IPG Sales <ipgsales@cyberstation.net> wrote:

>  See my reply to Tim Phillip - it is checked extensively 
> 
> If the algorithm sucks, prove it - please read the messages back and 

See my comment below.
[..]
> > [..]
> > > In general, you will find the kernel of the propgations consists of 64
> > > equation sets of the form:
> > > 
> > >        Bi=(Bi+Ci MOD Di) Mod 256             Large prime numbers
> > >        ENCRYPTEXTi=OTP[Bi] XOR PLAINTEXTi    Encryption
> > >        OTP[Bi]=ENCRYPTEXTi                   Makes the OTP Dynamic
> > 
> > Bah. Looks to me like simple garbling, only using a large stream.
> > 
> > Encrypt a stream of zeros with that method, and you'll get repeated
> > strings of OTP[Bi]'s.  An unsophisticated high school student could
> > crack that.


 





Thread