From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: a433193f18840b2c71681dc37cbe07e95f32b8456c81fb43efc0fffba79106d1
Message ID: <1.5.4.32.19961105012435.006acd50@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-11-05 08:32:55 UTC
Raw Date: Tue, 5 Nov 1996 00:32:55 -0800 (PST)
From: John Young <jya@pipeline.com>
Date: Tue, 5 Nov 1996 00:32:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: Protecting Your Data With Crypto
Message-ID: <1.5.4.32.19961105012435.006acd50@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
We have put the November UNIX Review article Peter cited
in his letter to the editor, "Protecting Your Data With Cryptography,"
at:
http://jya.com/protect.htm
----------
Peter Allan wrote:
>
>[ I refer to the article starting on p55
> of the Nov 1996 Unix Review. ]
>
>-----letter to Ed start here------
>
>Andrew,
>
>Congratulations on a welcome crypto article in UR.
>
>This is an important topic for security, networks,
>web-based commerce etc and is only going to increase in
>importance as people realise data is money.
>
>The article did raise my eyebrows a few times though
>with some wild statements - about the speed of brute-force
>attacks on DES, and about USG 'key escrow' proposals,
>patents and key certification.
>
>Also there are absolutely crucial issues not touched on,
>probably for lack of space. Details matter, and if you're
>contemplating another article on the subject I'd be happy
>to write it [subject to my boss' approval] or review it
>before publication. The field moves fast at times, and
>it would be good to keep an eye on the subject in a fairly
>regular column.
>
>Strangely, your author didn't mention ftp.ox.ac.uk,
>an ftp site for many good crypto tools, which
>(as a UK site) is not subject to US export restrictions.
>
>
> -- Peter Allan peter.allan@aeat.co.uk
Return to November 1996
Return to “John Young <jya@pipeline.com>”
1996-11-05 (Tue, 5 Nov 1996 00:32:55 -0800 (PST)) - Protecting Your Data With Crypto - John Young <jya@pipeline.com>