From: Vin McLellan <vin@shore.net>
To: cypherpunks@toad.com
Message Hash: e9e573220fba98a552862eb0c3396d922b37e209775ba2403e9f8ec6c5fab160
Message ID: <v03007800aef79ca2fd65@[206.243.166.164]>
Reply To: N/A
UTC Datetime: 1997-01-07 06:30:26 UTC
Raw Date: Mon, 6 Jan 1997 22:30:26 -0800 (PST)
From: Vin McLellan <vin@shore.net>
Date: Mon, 6 Jan 1997 22:30:26 -0800 (PST)
To: cypherpunks@toad.com
Subject: Relative Strength of 40-bit Crypto Implementations
Message-ID: <v03007800aef79ca2fd65@[206.243.166.164]>
MIME-Version: 1.0
Content-Type: text/plain
A client asked me today about where he could find evidence of the
relative strength of different encryption algorithms, when all are
restricted to 40-bit keys. He assumed dot-Gov was going to restrict his
export product to the 40-bit limit, but he wanted to provide the strongest
security he could within that limitation.
How should I have answered him?
Vin McLellan + The Privacy Guild + <vin@shore.net>
53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548
Return to January 1997
Return to “Vin McLellan <vin@shore.net>”
1997-01-07 (Mon, 6 Jan 1997 22:30:26 -0800 (PST)) - Relative Strength of 40-bit Crypto Implementations - Vin McLellan <vin@shore.net>