From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
To: cypherpunks@toad.com
Message Hash: 99014ec4a5ac123c6b7f07b959d71aaf5222410b38029f103c90797c880aa95d
Message ID: <VVZH1D96w165w@bwalk.dm.com>
Reply To: <853170077.1023898.0@fatmans.demon.co.uk>
UTC Datetime: 1997-01-14 02:24:11 UTC
Raw Date: Mon, 13 Jan 1997 18:24:11 -0800 (PST)
From: dlv@bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 13 Jan 1997 18:24:11 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: IMDMP: SOURCE CODE RELEASE ANNOUNCEMENT
In-Reply-To: <853170077.1023898.0@fatmans.demon.co.uk>
Message-ID: <VVZH1D96w165w@bwalk.dm.com>
MIME-Version: 1.0
Content-Type: text/plain
paul@fatmans.demon.co.uk writes:
> > Comment: "What do you mean by 'extensive research'."
> > Reply: Benchmark tests. Source code comparisons. Documentations of other
> > algorithms. "Applied Cryptography".
>
> So you have read applied cryptography and decided that qualifies you
> as a cryptographer?
That's much better that Paul Bradley who's totally ignorant of cryptography.
But I agree that Bruce's book is neither necessary nor sufficient for someone
wanting to learn cryptography.
> > Comment: "What kind of industry standard is IMDMP above?"
> > Reply: 128-bit encryption. Average DES is 128. PGP tops 1024. IDEA goes at
> > 128. RSA the same. Full security IMDMP is 2048-bit. Any other questions?
>
> This is irrelevant rubbish, if there is a cryptanalytic attack on
> your algorithm a brute force attack becomes unecessary and key size is
> not of consequence.
What charming manners. And Paul Bradley's own rants about "brute force
attacks on one-time pads" are not rubbish, I suppose?
And how come Paul didn't use the word "fuck" in every paragraph, the way
he usually does?
---
Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
Return to January 1997
Return to “paul@fatmans.demon.co.uk”