From: paul@fatmans.demon.co.uk
To: cypherpunks@toad.com
Message Hash: 0b44b2fec6a53a69e7109848bc0f4c4ed505d9612dbadfd598d62e7ba2836753
Message ID: <841572886.28792.0@fatmans.demon.co.uk>
Reply To: N/A
UTC Datetime: 1996-09-01 12:26:23 UTC
Raw Date: Sun, 1 Sep 1996 20:26:23 +0800
From: paul@fatmans.demon.co.uk
Date: Sun, 1 Sep 1996 20:26:23 +0800
To: cypherpunks@toad.com
Subject: Re: Encryption
Message-ID: <841572886.28792.0@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
> Algorithm: Select bit-groups of random length from the file until the file is
> completely processed. Shuffle the bits in each group randomly and
> save each group back to the file. Repeat if needed using different
> key-strings for each successive encryption, for increased security.
You pay no attention whatsoever to key distribution, the fact that
this is just a form of permutation and no substitution is used, also
how do you account for the fact that the user`s random number source
may not be strong, even recognized rng`s like the keyboard latency
routines in pgp grind to a halt when faced with a hardware
perculiarity like a keyboard buffer etc...
Datacomms Technologies web authoring and data security
Paul Bradley, Paul@fatmans.demon.co.uk
Http://www.fatmans.demon.co.uk/crypt/
"Don`t forget to mount a scratch monkey"
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6
mQCNAjH9j+cAAAEEAMBvREiQR0ot9dFCO0TiSCSunAYLv2g1Bc6I3bz8FzKXNH53
6mieJf/W4rD+CxJpT0q9RQaaoRtkHJLwbjfK2il3D7mEahMAyqvF/xRJNqkXfhM3
sRJM0Jh43l+W0M5vwokbEbk25/bxWWGspTsLD3YHbzKnG6pOcL5OPIRbv66xAAUR
tCdQYXVsIEJyYWRsZXkgPHBhdWxAZmF0bWFucy5kZW1vbi5jby51az4=
=riHc
-----END PGP PUBLIC KEY BLOCK-----
Return to September 1996
Return to “paul@fatmans.demon.co.uk”
1996-09-01 (Sun, 1 Sep 1996 20:26:23 +0800) - Re: Encryption - paul@fatmans.demon.co.uk