From: Benjamin Grosman <bgrosman@healey.com.au>
To: jonathon <grafolog@netcom.com>
Message Hash: 1877ab9da4da73752ec75108f9be705156f3defaf214d7ee0ef15634acfcf0fc
Message ID: <2.2.32.19961201090304.0075804c@healey.com.au>
Reply To: N/A
UTC Datetime: 1996-11-30 12:08:14 UTC
Raw Date: Sat, 30 Nov 1996 04:08:14 -0800 (PST)
From: Benjamin Grosman <bgrosman@healey.com.au>
Date: Sat, 30 Nov 1996 04:08:14 -0800 (PST)
To: jonathon <grafolog@netcom.com>
Subject: Re: Announcement: Very Good Privacy
Message-ID: <2.2.32.19961201090304.0075804c@healey.com.au>
MIME-Version: 1.0
Content-Type: text/plain
Dear Sir,
> I'm not sure how an encryption product that uses encryption
> algorithms weaker than Pretty Good Privacy can be described
> as being better than PGP.
>
> Especially when all the algorithms listed have known problems
> of one kind, or another. << And yes, I know that the known
> problems -- in some instances --- are entirely theoretical in
> nature. >>
What puzzles me is that he included two cyphers that are _extremely_ easy to
break, the vignere cypher and the ascii cypher. Why include these? And what
is his new permutation of RC4 and DES?
Yours Sincerely,
Benjamin Grosman
Return to November 1996
Return to “Benjamin Grosman <bgrosman@healey.com.au>”
1996-11-30 (Sat, 30 Nov 1996 04:08:14 -0800 (PST)) - Re: Announcement: Very Good Privacy - Benjamin Grosman <bgrosman@healey.com.au>