From: bobbi <rkluge@nunic.nu.edu>
To: Bill Frantz <frantz@netcom.com>
Message Hash: bae23fb9dca5799dd265ecd4050e51e4993abd6edb2b096664d1d79bf2ba2d0f
Message ID: <Pine.GSO.3.95.961224153949.7677B-100000@nunic.nu.edu>
Reply To: <v03007811aee5e4fb78dd@[206.217.121.78]>
UTC Datetime: 1996-12-25 00:00:21 UTC
Raw Date: Tue, 24 Dec 1996 16:00:21 -0800 (PST)
From: bobbi <rkluge@nunic.nu.edu>
Date: Tue, 24 Dec 1996 16:00:21 -0800 (PST)
To: Bill Frantz <frantz@netcom.com>
Subject: Re: domestic laws/policies
In-Reply-To: <v03007811aee5e4fb78dd@[206.217.121.78]>
Message-ID: <Pine.GSO.3.95.961224153949.7677B-100000@nunic.nu.edu>
MIME-Version: 1.0
Content-Type: text/plain
My understanding goes with along with your statements.
I got asked a question the other day and that person emphatically stated
you "must" register the algorithm with the NSA(for domestic use).
I was not aware of this even for exporting software that has cryptographic
capability. If you export software do you have to "register" the
algorithm? Or maybe I should ask - are there any situations where you do
have to register the algorithm? For export I'm only aware that the
strength of the algoritm has to be equal to or less than 40-bit DES.
I think he was getting confused with GAK.
bobbi kluge voice: 619.945.6248
rkluge@nunic.nu.edu fax: 619.945.6397
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj "Once more
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1 into the
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/) breach.." WS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Return to December 1996
Return to “bobbi <rkluge@nunic.nu.edu>”