From: “E. ALLEN SMITH” <EALLENSMITH@ocelot.Rutgers.EDU>
To: tcmay@got.net
Message Hash: 6b726ef814fdcbcd013fa270a5b5cbe1c7c8d39b83e46ba6aac717435a734345
Message ID: <01I25ASYNMT6AKTUGH@mbcl.rutgers.edu>
Reply To: N/A
UTC Datetime: 1996-03-10 02:30:56 UTC
Raw Date: Sun, 10 Mar 1996 10:30:56 +0800
From: "E. ALLEN SMITH" <EALLENSMITH@ocelot.Rutgers.EDU>
Date: Sun, 10 Mar 1996 10:30:56 +0800
To: tcmay@got.net
Subject: Re: Cryptanalysis
Message-ID: <01I25ASYNMT6AKTUGH@mbcl.rutgers.edu>
MIME-Version: 1.0
Content-Type: text/plain
From: IN%"tcmay@got.net" 9-MAR-1996 12:05:04.70
>There are very good reasons to say little about "conventional
>cryptanalysis": it just doesn't matter much with modern ciphers, such as
>public key systems. Modern ciphers don't fall to conventional attacks based
>on word frequency, pattern analysis, etc.
I realize that this may also be considered an out of date subject,
but what's a good reference for codes as opposed to cyphers (other than
the one reference in the Cyphernomicon which includes "codes" in its title)?
Thanks,
-Allen
Return to March 1996
Return to “Mike Tighe <tighe@spectrum.titan.com>”