From: Three Blind Mice <3bmice@nym.alias.net>
 To: <cypherpunks@toad.com>
 Message Hash: a8434336ff2ddc11039e0e66a9f8086ae0e10f97a9caab988c1a43ef7fd0499d
 Message ID: <199611022305.SAA22650@anon.lcs.mit.edu>
 Reply To: N/A
 UTC Datetime: 1996-11-02 23:05:31 UTC
 Raw Date: Sat, 2 Nov 1996 15:05:31 -0800 (PST)
From: Three Blind Mice <3bmice@nym.alias.net>
Date: Sat, 2 Nov 1996 15:05:31 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: Re: Unix User Password File Encryption
Message-ID: <199611022305.SAA22650@anon.lcs.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain
On Sat, 2 Nov 1996, Erp wrote:
> Compare the outcomed encryptions --  And find a pattern in them..  Now in
There is the flaw in this logic.  If you do find a pattern, then this
means that the algorithm is *BROKEN*.
--3bmice
Return to November 1996
Return to “Three Blind Mice <3bmice@nym.alias.net>”
1996-11-02 (Sat, 2 Nov 1996 15:05:31 -0800 (PST)) - Re: Unix User Password File Encryption - Three Blind Mice <3bmice@nym.alias.net>