From: Bruce Baugh <bruce@aracnet.com>
To: cypherpunks@toad.com
Message Hash: f3d9914470e27fbf8b8b623ea4921e97c944b46d4a394cf6543caeeb3178ae95
Message ID: <2.2.32.19960222214441.006945b8@mail.aracnet.com>
Reply To: N/A
UTC Datetime: 1996-02-23 02:24:54 UTC
Raw Date: Fri, 23 Feb 1996 10:24:54 +0800
From: Bruce Baugh <bruce@aracnet.com>
Date: Fri, 23 Feb 1996 10:24:54 +0800
To: cypherpunks@toad.com
Subject: Analysis wanted
Message-ID: <2.2.32.19960222214441.006945b8@mail.aracnet.com>
MIME-Version: 1.0
Content-Type: text/plain
If anyone is interested in helping out the gentleman quoted below by
ruthlessly savaging :-) his algorithm and assumptions, would you please
e-mail me so I can hook you up with him? (He decided not to post to the list
directly to avoid the usual signal-to-noise problems. Can't blame him. But I
offered to forward along relevant info and queries.)
>Is there a way of someone trustworthy to try and break VGP and express an
>opinion on it's strength or weakness. I can basically describe the
>encryption approach and the reencryption, number of passes, final conversion
>to clean text from a binary etc. with you to try to give you some level of
>comfort without sharing the code. I would also like to have someone
>competent run it through the paces, and then if it is not worthy, go back to
>the drawing board.
>
>In short, I appreciate your comments and frankness, and assure you I am
>interested in your opinion or anyones opinion, and interested in making the
>system rugged. I agree with your point, and perhaps it sums the whole issue
>up in one line, and that is that "bad encryption is worse than no
>encryption". encouraging a false sense of security is not something I want
>to be part of, I do want to be responsible to others.
--
Bruce Baugh
bruce@aracnet.com
http://www.aracnet.com/~bruce
Return to February 1996
Return to “Bruce Baugh <bruce@aracnet.com>”
1996-02-23 (Fri, 23 Feb 1996 10:24:54 +0800) - Analysis wanted - Bruce Baugh <bruce@aracnet.com>