From: Gary Howland <gary@systemics.com>
To: cypherpunks@toad.com
Message Hash: 1cdceb0380ba1c8df5662596e6b7618242b82e9320d47aef8c14c8066d057428
Message ID: <3222E9E9.237C228A@systemics.com>
Reply To: <960826234448_76473.1732_BHT119-3@CompuServe.COM>
UTC Datetime: 1996-08-27 15:05:02 UTC
Raw Date: Tue, 27 Aug 1996 23:05:02 +0800
From: Gary Howland <gary@systemics.com>
Date: Tue, 27 Aug 1996 23:05:02 +0800
To: cypherpunks@toad.com
Subject: Re: The POOCH
In-Reply-To: <960826234448_76473.1732_BHT119-3@CompuServe.COM>
Message-ID: <3222E9E9.237C228A@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain
JOHN E. HOLT wrote:
>
> The Pouch uses a 64 x 64 block product cipher, a 1024 bit random initialization
> vector and the CBC technique. Most experts agree that such an implementation
> is highly resistant to all forms of cryptographic attack.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Wow! Resistant to those not invented yet - I guess this means one of
two things - the pooch is a OTP, or Mr. Holt has a time machine.
> Hellman and Dilfie rely on knowing the algorithm for their known plain text attacks
> An unpublished algorithm forces them into reverse engineering the computer
> programs to learn the algorithm. The POUCH has many roadblocks built in
> to prevent this.
Wow! (again). Dongleless protection! I'm impressed. Now we don't need
tamper resistant smart cards - we can do it all in software!
Gary
--
pub 1024/C001D00D 1996/01/22 Gary Howland <gary@systemics.com>
Key fingerprint = 0C FB 60 61 4D 3B 24 7D 1C 89 1D BE 1F EE 09 06
^S
^A^Aoft FAT filesytem is extremely robust, ^Mrarely suffering from^T^T
Return to August 1996
Return to “The Prisoner <nul@void.gov>”