1996-11-30 - Re: Announcement: Very Good Privacy

Header Data

From: Benjamin Grosman <bgrosman@healey.com.au>
To: jonathon <grafolog@netcom.com>
Message Hash: 1877ab9da4da73752ec75108f9be705156f3defaf214d7ee0ef15634acfcf0fc
Message ID: <2.2.32.19961201090304.0075804c@healey.com.au>
Reply To: N/A
UTC Datetime: 1996-11-30 12:08:14 UTC
Raw Date: Sat, 30 Nov 1996 04:08:14 -0800 (PST)

Raw message

From: Benjamin Grosman <bgrosman@healey.com.au>
Date: Sat, 30 Nov 1996 04:08:14 -0800 (PST)
To: jonathon <grafolog@netcom.com>
Subject: Re: Announcement: Very Good Privacy
Message-ID: <2.2.32.19961201090304.0075804c@healey.com.au>
MIME-Version: 1.0
Content-Type: text/plain


Dear Sir,

>	I'm not sure how an encryption product that uses encryption
>	algorithms weaker than Pretty Good Privacy can be described
>	as being better than PGP.  
>
>	Especially when all the algorithms listed have known problems
>	of one kind, or another.   << And yes, I know that the known
>	problems -- in some instances --- are entirely theoretical in
>	nature.  >>

What puzzles me is that he included two cyphers that are _extremely_ easy to
break, the vignere cypher and the ascii cypher. Why include these? And what
is his new permutation of RC4 and DES?

Yours Sincerely,

Benjamin Grosman






Thread