From: “Igor Chudov @ home” <ichudov@algebra.com>
To: Crypto <cypherpunks@toad.com
Message Hash: 56a031da40c0a5454cb731edde63d3930f073989896ffbf4e00c13c2a75b7bf5
Message ID: <199701261712.JAA18832@toad.com>
Reply To: N/A
UTC Datetime: 1997-01-26 17:12:34 UTC
Raw Date: Sun, 26 Jan 1997 09:12:34 -0800 (PST)
From: "Igor Chudov @ home" <ichudov@algebra.com>
Date: Sun, 26 Jan 1997 09:12:34 -0800 (PST)
To: Crypto <cypherpunks@toad.com
Subject: Re: DPT Win 3.xx, 95, NT ENCRYPTION program
Message-ID: <199701261712.JAA18832@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
In article <5cd7ki$52b@news.xs4all.nl> bernard@xs4all.nl Crypto wrote:
Newsgroups: comp.security.misc
* DPT Win 3.xx, 95, NT ENCRYPTION program
*
* DPT16 or DPT32 total encryption Windows program.
*
* Encrypt fast, Files, Dir, Floppys, e-mail, text or Messages ....
*
* Key up to 30 Kb, Hide your encrypted data's in a picture file.
* Direct mail encryption, Visit the Data Privacy Tools home page.
*
* at; http://www.xs4all.nl/~bernard
Bernard, thanks for an interesting post. I am Cc-ing your message to
Cypherpunks mailing list which is ostensibly dedicated to discussions
of cryptography.
As follows from info on your home page, you do use simple XOR to
encrypt your data. It was not clear to me though, how do you generate
the keys to encrypt the data. I am sure that many readers of cypherpunks
mailing list will be interested, so please send a copy of your reply
to cypherpunks@toad.com.
igor
Return to January 1997
Return to ““Igor Chudov @ home” <ichudov@algebra.com>”
1997-01-26 (Sun, 26 Jan 1997 09:12:34 -0800 (PST)) - Re: DPT Win 3.xx, 95, NT ENCRYPTION program - “Igor Chudov @ home” <ichudov@algebra.com>