From: DataETRsch@aol.com
To: 3umoelle@informatik.uni-hamburg.de
Message Hash: 7c99efc2f123b004c0cd9310791194d8b057ef947d36c5eb99eb77cb4f3fc622
Message ID: <9705271750022019806503@emout15.mail.aol.com>
Reply To: _N/A
UTC Datetime: 1997-05-27 22:26:03 UTC
Raw Date: Wed, 28 May 1997 06:26:03 +0800
From: DataETRsch@aol.com
Date: Wed, 28 May 1997 06:26:03 +0800
To: 3umoelle@informatik.uni-hamburg.de
Subject: CRACKIT.DAT increased to 50,000 bytes.
Message-ID: <970527175002_2019806503@emout15.mail.aol.com>
MIME-Version: 1.0
Content-Type: text/plain
In a message dated 97-05-26 19:38:43 EDT, you write:
<< The test file is only 836 bytes long. Could you please post a file
consisting of, say, 50.000 space characters encrypted with the same
key? >>
50,000 with the same key? Sure. A new file will be posted under the same name
as the previously posted one. The same key will be used to encrypt the file
before posting. Contest details will be reposted. By the way, a simple
VSA2048 decryption program will be released soon so that there will not exist
a need to develop one to decrypt the file. Also, the contest expiration date
has been extended to July 1st, 1997. Good luck!
Again, random XOR is *not* the only method used to encrypt data. In fact,
random XOR could be left out. Consider examining VSACMInternal (in
INTUNIT.PAS) and VSACMProcessOperation in LIBUNIT.PAS for additional
information.
Regards,
Jeremy Yu-Ramos
DataET Research
Return to May 1997
Return to “ichudov@algebra.com (Igor Chudov @ home)”