From: “JOHN E. HOLT” <76473.1732@CompuServe.COM>
To: <cypherpunks@toad.com>
Message Hash: a3fd92dad6e77983655aa32a2e574578ab11664374915b8319cbc150e56f5698
Message ID: <96082623444876473.1732_BHT119-3@CompuServe.COM>
Reply To: _N/A
UTC Datetime: 1996-08-27 05:39:22 UTC
Raw Date: Tue, 27 Aug 1996 13:39:22 +0800
From: "JOHN E. HOLT" <76473.1732@CompuServe.COM>
Date: Tue, 27 Aug 1996 13:39:22 +0800
To: <cypherpunks@toad.com>
Subject: The POUCH
Message-ID: <960826234448_76473.1732_BHT119-3@CompuServe.COM>
MIME-Version: 1.0
Content-Type: text/plain
The Pouch uses a 64 x 64 block product cipher, a 1024 bit random initialization
vector and the CBC technique. Most experts agree that such an implementation is highly resistant to all forms of cryptographic attack.
Hellman and Dilfie rely on knowing the algorithm for their known plain text attacks
An unpublished algorithm forces them into reverse engineering the computer
programs to learn the algorithm. The POUCH has many roadblocks built in
to prevent this.
I refer to Cummings, Cryptography and Data Security pages 150 and 98 in this regard.
John Holt
Return to August 1996
Return to “The Prisoner <nul@void.gov>”