From: “Charles Choi (SAR)” <choi@virtu.sar.usf.edu>
To: Jim_Miller@bilbo.suite.com
Message Hash: 56f22bd37c995d72ca8542136d32343bec779504b5a8adfc0b354c3bb6df5255
Message ID: <Pine.SUN.3.91.960305200146.11469A-100000@virtu>
Reply To: <9603052110.AA00640@bilbo.suite.com>
UTC Datetime: 1996-03-06 03:55:51 UTC
Raw Date: Wed, 6 Mar 1996 11:55:51 +0800
From: "Charles Choi (SAR)" <choi@virtu.sar.usf.edu>
Date: Wed, 6 Mar 1996 11:55:51 +0800
To: Jim_Miller@bilbo.suite.com
Subject: Signature
In-Reply-To: <9603052110.AA00640@bilbo.suite.com>
Message-ID: <Pine.SUN.3.91.960305200146.11469A-100000@virtu>
MIME-Version: 1.0
Content-Type: text/plain
Delurking beginner...
1) Is it possible to base a privacy key ( e.g. PGP ) on a fractal
equation, instead of an algorithm based on two primes?
This would allow for an eternal level of complexity due
to infinite field of depth one can find as one 'zooms in'
closer ( correct me because I'm wrong; I'm not a math major,
although increasingly I wish I was... ), allowing for near
unbreakable privacy of information.
2) It is dead certain that our governments will want at their disposal
a decrypt program to crack into data containing information
possibly related to crimes ( or what not ). Perhaps access
to this program can somehow be leased out like a search warrant
by a judge, which at least means a check and balance, and any
unauthorized use of the program ( perhaps when it cracks into
encryptext [ what I call ciphertext, as opposed to uncryptext,
or plaintext ;) ] it leaves a very characteristic signature, or
cracking into the database that contains the program is near
impossible; maybe it's not physically connected to the
Internet until the warrant is granted ) results in punishment,
of course.
Back to lurking...
Sincerely.
Quentin Holte.
( aka Charles Choi. )
You are all the Buddha.
- Last words
of Buddha.
If you see the Buddha,
kill him.
- Zen proverb.
Return to March 1996
Return to ““Mark M.” <markm@voicenet.com>”