From: Three Blind Mice <3bmice@nym.alias.net>
To: <cypherpunks@toad.com>
Message Hash: a8434336ff2ddc11039e0e66a9f8086ae0e10f97a9caab988c1a43ef7fd0499d
Message ID: <199611022305.SAA22650@anon.lcs.mit.edu>
Reply To: N/A
UTC Datetime: 1996-11-02 23:05:31 UTC
Raw Date: Sat, 2 Nov 1996 15:05:31 -0800 (PST)
From: Three Blind Mice <3bmice@nym.alias.net>
Date: Sat, 2 Nov 1996 15:05:31 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Re: Unix User Password File Encryption
Message-ID: <199611022305.SAA22650@anon.lcs.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain
On Sat, 2 Nov 1996, Erp wrote:
> Compare the outcomed encryptions -- And find a pattern in them.. Now in
There is the flaw in this logic. If you do find a pattern, then this
means that the algorithm is *BROKEN*.
--3bmice
Return to November 1996
Return to “Three Blind Mice <3bmice@nym.alias.net>”
1996-11-02 (Sat, 2 Nov 1996 15:05:31 -0800 (PST)) - Re: Unix User Password File Encryption - Three Blind Mice <3bmice@nym.alias.net>