From: scrappo.reverb@juno.com (A L)
To: cypherpunks@toad.com
Message Hash: 21a9684d58c19a69c964fb8ad1feb26e20ed62fb2fc82ca20d9d56ee725c9b00
Message ID: <19960910.225608.8159.0.scrappo.reverb@juno.com>
Reply To: N/A
UTC Datetime: 1996-09-11 10:29:28 UTC
Raw Date: Wed, 11 Sep 1996 18:29:28 +0800
From: scrappo.reverb@juno.com (A L)
Date: Wed, 11 Sep 1996 18:29:28 +0800
To: cypherpunks@toad.com
Subject: No Subject
Message-ID: <19960910.225608.8159.0.scrappo.reverb@juno.com>
MIME-Version: 1.0
Content-Type: text/plain
I apologize for any behavior on behalf of my domain name.
(A little background:)
I am a cryptographer hopeful. I was interested in such
things as the Caesar Cypher and the Enigma machine and the
Roman encryption "padlock" when other kids were more
interested in how the water fountain shot water straight up.
After some thought and a little writing, I developed
an encryption program using Mallard Basic on an old
Amstrad (which I still grudgingly keep) with programming
skills I taught myself.
I know most of the basics regarding RSA, PGP, and
assorted single pass (?) cyphers. One thing I do not
understand has to do with how RSA sieves large primes,
etc. That is one of the few things that I do not
understand about RSA. Another aspect of RSA I do not
understand is the usage of primes (or any number) in the
actual encryption process. Does the program add numbers
from the key to the plaintext to create the cyphertext, or
does it use some other process.
I am sorry if any of these questions seem redundant and/or
stupid, but at this point in time, I can't get my hands on
any actual explanation for how it works. (I would get a
copy of "Applied Cryptography," but I do not have any
source of income, which also explains Juno.)
Aiieee!!! the dreaded "J" word!
Once again, I apologize if any of this caused annoyance
or sickness.
Return to September 1996
Return to “scrappo.reverb@juno.com (A L)”
1996-09-11 (Wed, 11 Sep 1996 18:29:28 +0800) - No Subject - scrappo.reverb@juno.com (A L)