1997-01-24 - GOO_gol

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: a1abc0d8fcfcdfb45098e7c140513e11c5996261dcc04b5035a8ded9ec07dab2
Message ID: <1.5.4.32.19970124004734.006dc1a4@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-01-24 00:52:39 UTC
Raw Date: Thu, 23 Jan 1997 16:52:39 -0800 (PST)

Raw message

From: John Young <jya@pipeline.com>
Date: Thu, 23 Jan 1997 16:52:39 -0800 (PST)
To: cypherpunks@toad.com
Subject: GOO_gol
Message-ID: <1.5.4.32.19970124004734.006dc1a4@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


Richard Crandall, NeXT scientist, writes eloquently on large 
numbers in February SciAm. He cites cryptographic strength as
one result of research on the gargantuan googol and googolplex. 
He reviews current work on sieve techniques for factorization 
-- Quadratic, Number Field, Elliptic Curve Method and others -- 
as well as advanced algorithms. And exclaims:

   Blaine Garst, Doug Mitchell, Avadis Tevanian, Jr., and I
   implemented at NeXT what is one of the strongest -- if
   not the strongest -- encryption schemes available today,
   based on Mersenne primes. This patented scheme, termed
   Fast Elliptic Encryption (FEE), uses the algebra of
   elliptic curves, and it is very fast.

-----

GOO_gol


Thanks to PJP for pointing.






Thread