From: “Perry E. Metzger” <perry@piermont.com>
To: Jean-Paul Kroepfli <JeanPaul.Kroepfli@ns.fnet.fr>
Message Hash: a656ce96d97702811d73f6b32d8878089fbd02b56d7693ce7d7d73ca12f7c31f
Message ID: <199605291743.NAA01615@jekyll.piermont.com>
Reply To: <01BB4D90.20F86640@JPKroepsli.S-IP.EUnet.fr>
UTC Datetime: 1996-05-29 23:31:46 UTC
Raw Date: Thu, 30 May 1996 07:31:46 +0800
From: "Perry E. Metzger" <perry@piermont.com>
Date: Thu, 30 May 1996 07:31:46 +0800
To: Jean-Paul Kroepfli <JeanPaul.Kroepfli@ns.fnet.fr>
Subject: Re: What is the strength of the MPJ/Diamond algorithm (Michael Paul Johnson 1989)
In-Reply-To: <01BB4D90.20F86640@JPKroepsli.S-IP.EUnet.fr>
Message-ID: <199605291743.NAA01615@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain
Jean-Paul Kroepfli writes:
> I have seen the Diamond2 algorithm in the dlock2 package, with its
> predecessors MPJ, MPJ2. This a thesis by Michael Paul Johnson for
> is Master of Science degree (1989), and a free softwar (date:
> 12/21/1995). Schneier's Applied Cryptography doesn't say anything
> about MPJ or Diamond. What is its strength?
Unknown. MPJ is a skilled amateur. However, none of his algorithms
have been rigorously analyzed.
Perry
Return to May 1996
Return to ““Perry E. Metzger” <perry@piermont.com>”