From: Mike Fletcher <fletch@ain.bls.com>
To: cypherpunks@toad.com
Message Hash: a4cf2f0a9243cf6b4a4b942b75299e1d64b6dc21767ff7b0e10933592870c739
Message ID: <9605230303.AA17239@outland.ain_dev>
Reply To: <199605230053.RAA28116@ohio.chromatic.com>
UTC Datetime: 1996-05-23 07:24:34 UTC
Raw Date: Thu, 23 May 1996 15:24:34 +0800
From: Mike Fletcher <fletch@ain.bls.com>
Date: Thu, 23 May 1996 15:24:34 +0800
To: cypherpunks@toad.com
Subject: Re: Layman's explanation for limits on escrowed encryption ...
In-Reply-To: <199605230053.RAA28116@ohio.chromatic.com>
Message-ID: <9605230303.AA17239@outland.ain_dev>
MIME-Version: 1.0
Content-Type: text/plain
> Could someone with some knowledge of NSA/DoS/FBI intentions please
> explain why key length limitations are necessary for escrowed
> encryption?
Obviously it's so they can keep feeding international traffic
through the [Insert fav TLA here]'s 64-bit cracking machines.
.5 * :), of course. (Is this an acceptable use for floating
point :).
---
Fletch __`'/|
fletch@ain.bls.com "Lisa, in this house we obey the \ o.O' ______
404 713-0414(w) Laws of Thermodynamics!" H. Simpson =(___)= -| Ack. |
404 315-7264(h) PGP Print: 8D8736A8FC59B2E6 8E675B341E378E43 U ------
Return to May 1996
Return to “Mike Fletcher <fletch@ain.bls.com>”