From: Germano Caronni <caronni@tik.ee.ethz.ch>
To: dthorn@gte.net (Dale Thorn)
Message Hash: a87b2664c0209e4dc60de92081fdc53c4b53319d197ab99247091257e642b1c5
Message ID: <199608301540.RAA06793@kom30.ethz.ch>
Reply To: <3226ADC6.6C87@gte.net>
UTC Datetime: 1996-08-30 18:46:13 UTC
Raw Date: Sat, 31 Aug 1996 02:46:13 +0800
From: Germano Caronni <caronni@tik.ee.ethz.ch>
Date: Sat, 31 Aug 1996 02:46:13 +0800
To: dthorn@gte.net (Dale Thorn)
Subject: Re: Encryption
In-Reply-To: <3226ADC6.6C87@gte.net>
Message-ID: <199608301540.RAA06793@kom30.ethz.ch>
MIME-Version: 1.0
Content-Type: text
Dale Thorn wrote:
> It appears to me that PGP encryption et al is really 1940's technology,
> albeit fancied up by 1990's computers. Why use keys and cyphers when
> all you should have to do is maximize the randomization of bits in a
[...]
> Algorithm: Select bit-groups of random length from the file until the file is
> completely processed. Shuffle the bits in each group randomly and
> save each group back to the file. Repeat if needed using different
> key-strings for each successive encryption, for increased security.
Very nice. There are just two little issues:
a) How do you generate the random bytes?
b) How do you transmit them to the other side, without having a secure channel?
In 1940, you needed airplanes to solve b), now you can use PGP (or any
other combined strong asymmetric & symmetric crypto) to solve b) and
partially even a), saving you a lot of fuel ;-)
BTW: In my opinion, your 'randomization of bits' corresponds to cyphers,
and the way you randomize them corresponds to 'keys'.
My 0.2 cents worth.
Gec
Return to August 1996
Return to “ichudov@algebra.com (Igor Chudov @ home)”