1996-10-22 - Re: Apologies and Clarifications -

Header Data

From: paul@fatmans.demon.co.uk
To: cypher@cyberstation.net
Message Hash: 9de17370ab0e6bccb8a53f463170227391f06d180787e5b91113865cefcb5b56
Message ID: <846000188.16795.0@fatmans.demon.co.uk>
Reply To: N/A
UTC Datetime: 1996-10-22 16:23:11 UTC
Raw Date: Tue, 22 Oct 1996 09:23:11 -0700 (PDT)

Raw message

From: paul@fatmans.demon.co.uk
Date: Tue, 22 Oct 1996 09:23:11 -0700 (PDT)
To: cypher@cyberstation.net
Subject: Re: Apologies and Clarifications -
Message-ID: <846000188.16795.0@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain


 
>          Some will contentiously assert that the key and other
>          parameters might be hacked. While we include within the
>          system facilitators that reduce that risk to a minimum, and
>          to near zero if you use simple precautions, it is true that
>          the hacking possibility exists. However, that possibility
>          exists for RSA, PGP, hardware sourced OTPs, or any other
>          form of security or encryption. We are better positioned in
>          that regard than others but in terms of the human element,
>          as we all know, there is no such thing as perfection.

Listen fool,

Much as we might advance this possibility we do not need to.

Your system has been proven insecure by two cryptanalytic attacks, 
one by Adam and one by myself. if you cannot understand these attacks 
what are you doing creating cryptosystems and if you can understand 
them WHY are you still calling your system secure?

Please enlihten us as to which of these two distinct cases you fall 
into, if 1. then you are a fool, if 2. then you are a stubborn fool.

 

  Datacomms Technologies web authoring and data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: 5BBFAEB1
     "Don`t forget to mount a scratch monkey"





Thread