1997-01-10 - Re: IMPORTANT: Additional information about UDCM.

Header Data

From: Eric Murray <ericm@lne.com>
To: snow@smoke.suba.com (snow)
Message Hash: ec6a2757636724f6657d205126985250f567f141ef33dc60943c07beebc2dcf9
Message ID: <199701101717.JAA31508@slack.lne.com>
Reply To: <199701100535.XAA00734@smoke.suba.com>
UTC Datetime: 1997-01-10 17:18:56 UTC
Raw Date: Fri, 10 Jan 1997 09:18:56 -0800 (PST)

Raw message

From: Eric Murray <ericm@lne.com>
Date: Fri, 10 Jan 1997 09:18:56 -0800 (PST)
To: snow@smoke.suba.com (snow)
Subject: Re: IMPORTANT: Additional information about UDCM.
In-Reply-To: <199701100535.XAA00734@smoke.suba.com>
Message-ID: <199701101717.JAA31508@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain


snow writes:
> 
> > Also: The AOL web site address my company has may not always work out when
> > the server is having problems or user overloads. Please try again later.
> > Again, the web site address for UDCM, Universal Data Cryptography Module, is:
> > http://members.aol.com/DataETRsch/udcm.html.
> 
>      For $100 up front, and about $40 a month you can get a real domain name
> and virtual domain that doesn't have a problem with "user overloads". If 
> you are so high tech, why are you using AOL for a WEB SERVER? (this is a 
> seperate issue from using it for _access_)

You would think that a company that could issue "$1,250,000 in collateral
backed zero-coupon bonds" would be able to afford a real web site.

 
> > IN RESPONSE TO THE FLAME MAIL DATA RESEARCH HAS BEEN RECEIVING:
> > Note: The 18 "sub-algorithms" of IMDMP are basically algorithm "modes", and,
> > yes, many algorithms do *not* have multiple encryption layers, although,
> > obviously, the more advanced ones do.

Obviously.

> Also, 256 bytes is equal to 2048 bits.

Thank you, I was wondering about that.

> > I realize that most of you out there know that, but some of you don't. "Bits"
> > are referenced more often than "bytes". And, the "industry standard" that
> > IMDMP is obviously well above is DES, etc. Also, DES 128, PGP 1024, RSA 128,

"industry standard"?  Which one, pray tell?


> > Are all of you out there satisfied?

No, not until your algorithm is made public and has been reviewed
by people who know what they are doing.  Most prudent crypto application
developers wait a few years after a new algorithm has been made public
to see if someone discovers flaws in it.

Unfortunately for you, the way you are announcing and promoting your
program makes it could like cryptographic snake oil.  Posting
such announcements to the cypherpunks list is a good way to get flamed.
Perhaps you should have posted to alt.biz.multi-level, where the
threshold of credulity is much higher.


-- 
Eric Murray  ericm@lne.com  ericm@motorcycle.com  http://www.lne.com/ericm
PGP keyid:E03F65E5 fingerprint:50 B0 A2 4C 7D 86 FC 03  92 E8 AC E6 7E 27 29 AF





Thread