From: Erp <erp@digiforest.com>
To: “Mark M.” <markm@voicenet.com>
Message Hash: 9d84c3f76ced09e2975d926209e9d0c16678b93bf11d3c39613092fddf533701
Message ID: <Pine.LNX.3.95.961102132046.15853A-100000@digital.digiforest.com>
Reply To: <Pine.LNX.3.95.961102125436.194A-100000@gak.voicenet.com>
UTC Datetime: 1996-11-02 20:35:53 UTC
Raw Date: Sat, 2 Nov 1996 12:35:53 -0800 (PST)
From: Erp <erp@digiforest.com>
Date: Sat, 2 Nov 1996 12:35:53 -0800 (PST)
To: "Mark M." <markm@voicenet.com>
Subject: Re: Unix User Password File Encryption
In-Reply-To: <Pine.LNX.3.95.961102125436.194A-100000@gak.voicenet.com>
Message-ID: <Pine.LNX.3.95.961102132046.15853A-100000@digital.digiforest.com>
MIME-Version: 1.0
Content-Type: text/plain
**what I said deleted**
>
> There aren't any known patterns that can be exploited. The output of DES
> encryption 25 times generates pseudo-random output. If a pattern did exist,
> cryptanalysis of DES would be very easy.
>
> Mark
But But But *laugh* --- Ok, here is my only straw in this lousy bushel of
confusion >) --- What about a Fuzzy Pattern? ---- Ya I know, that is a
pretty big staw... The thought of it is fuzzy, let alone a fuzzy pattern.
I've done a lot of reading on Fuzzy Sets and Fuzzy Logic in general.. I
see how it could work 'maybe' But, yes it is a very indefinite field.. To
many people don't believe in its possible existance...
Ok -- Any replys would be nice thanks bye.
Return to November 1996
Return to ““Mark M.” <markm@voicenet.com>”