From: PhneCards@aol.com
To: cypherpunks@toad.com
Message Hash: a5060137f9eaf028869c8faefe14bfe6462a552aa8cf7d9b7b40f8f09f1cd7b3
Message ID: <960925181213529562658@emout15.mail.aol.com>
Reply To: _N/A
UTC Datetime: 1996-09-26 05:09:17 UTC
Raw Date: Thu, 26 Sep 1996 13:09:17 +0800
From: PhneCards@aol.com
Date: Thu, 26 Sep 1996 13:09:17 +0800
To: cypherpunks@toad.com
Subject: Re: An idle thought on CBC and block lengths
Message-ID: <960925181213_529562658@emout15.mail.aol.com>
MIME-Version: 1.0
Content-Type: text/plain
Did you know this company is using your email address as part of
an unlawful email bomb?
I would advise you to write to them at cypherpunks@toad.com
and owner-cypherpunks@toad.com and advise them to stop
using your email address for this type of activity.
It is illegal to use a invalid return email address. If this continues, I
will
be forced to prosecute the return email address - which they are
making to look like you.
Below is the letter that I received in my email box
=================================================
In a message dated 96-09-25 15:52:17 EDT, you write:
>Subj: An idle thought on CBC and block lengths
>Date: 96-09-25 15:52:17 EDT
>From: osborne@gateway.grumman.com (Rick Osborne)
>Sender: owner-cypherpunks@toad.com
>To: cypherpunks@toad.com
>
>So I was sitting bored at home and thinking to myself: CBC is cool.
>Without the key, you're screwed because a single bit error propagates
>throughout the entire message. But then I was thinking, yeah, but you can
>still eventually get the ONE key. So I began to wonder what the difference
>in security is between encrypting an entire M with just one K in CBC, or
>encrypting M with permutations of K over specific block lengths.
>
>On the one hand you've got just one key, which makes it that much harder to
>find in the keyspace. On the other hand, If evil interloper Eve gets her
>hands it, she has to find all of the keys to get all of M. (Assuming she
>is using brute force and can't necessarily find the master K to permute
>into the subkeys.)
>
>The downsides are of course that on the one side you've got just one key,
>and once you get it, you get M. But on the other hand, you can get any one
>part of the message with less difficulty because of the higher number of
>keys. And, of course, if your master K is easy to brute force, then it's
>actually worse than the first option.
>
>Does anyone have opinions / knowledge of which is better?
>
>
>____________________________________________________________
>Rick Osborne osborne@gateway.grumman.com
>"The universe doesn't give you any points for doing things that are easy."
>
>
>
>----------------------- Headers --------------------------------
>From cypherpunks-errors@toad.com Wed Sep 25 15:51:46 1996
>Return-Path: cypherpunks-errors@toad.com
>Received: from mailhub.MyMail.Com (mailhub.mymail.com [206.247.118.1]) by
>emin14.mail.aol.com (8.6.12/8.6.12) with SMTP id PAA04207 for
><phnecards@aol.com>; Wed, 25 Sep 1996 15:51:43 -0400
>Received: from toad.com by mailhub.MyMail.Com (5.x/SMI-SVR4)
> id AA27411; Wed, 25 Sep 1996 13:47:22 -0600
>Received: (from majordom@localhost) by toad.com (8.7.5/8.7.3) id FAA16059
for
>cypherpunks-outgoing; Wed, 25 Sep 1996 05:57:39 -0700 (PDT)
>Received: from gateway.grumman.com (gateway.grumman.com [192.86.71.8]) by
>toad.com (8.7.5/8.7.3) with SMTP id FAA16054 for <cypherpunks@toad.com>;
Wed,
>25 Sep 1996 05:57:32 -0700 (PDT)
>Message-Id: <3.0b19.32.19960925085644.0068cb90@gateway.grumman.com>
>X-Sender: osborne@gateway.grumman.com
>X-Mailer: Windows Eudora Pro Version 3.0b19 (32)
>Date: Wed, 25 Sep 1996 08:56:45 -0400
>To: cypherpunks@toad.com
>From: Rick Osborne <osborne@gateway.grumman.com>
>Subject: An idle thought on CBC and block lengths
>Mime-Version: 1.0
>Content-Type: text/plain; charset="us-ascii"
>Sender: owner-cypherpunks@toad.com
>Precedence: bulk
Return to September 1996
Return to “The Deviant <deviant@pooh-corner.com>”