From: “William H. Geiger III” <whgiii@amaranth.com>
To: cypherpunks@toad.com
Message Hash: e07f66005bafae50ee19d04cad7cf361897b3f59e68e9518a650b3dd0c5493da
Message ID: <199609241649.LAA22238@mailhub.amaranth.com>
Reply To: N/A
UTC Datetime: 1996-09-25 00:09:19 UTC
Raw Date: Wed, 25 Sep 1996 08:09:19 +0800
From: "William H. Geiger III" <whgiii@amaranth.com>
Date: Wed, 25 Sep 1996 08:09:19 +0800
To: cypherpunks@toad.com
Subject: WARNING: This Message Actually Contains a Question Reguarding Crypto!
Message-ID: <199609241649.LAA22238@mailhub.amaranth.com>
MIME-Version: 1.0
Content-Type: text/plain
Hi,
I just recently downloaded copies of Blowfish & Ghost.
Does anyone have any experiance with these two algorithims?
How do they comare to RSA, DES, 3DES, IDEA ?
I can across a post awhile back that mentioned that they were using Blowfish in
PGPPhone. Can anyone confirm this?
Does anyone know how they are using Blowfish and why?
Thanks,
--
-----------------------------------------------------------
William H. Geiger III http://www.amaranth.com/~whgiii
Geiger Consulting WebExplorer & Java Enhanced!!!
Merlin Beta Test Site - WarpServer SMP Test Site
Author of PGPMR2 - PGP Front End for MR/2 Ice
Look for MR/2 Tips & Rexx Scripts
Get Work Place Shell for Windows!!
PGP & MR/2 the only way for secure e-mail.
Finger whgiii@amaranth.com for PGP Key and other info
-----------------------------------------------------------
Return to September 1996
Return to ““William H. Geiger III” <whgiii@amaranth.com>”