1997-06-30 - Re: Australian “Walsh” report exposes the hole in key escrow

Header Data

From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
To: cypherpunks@toad.com
Message Hash: 677c75e6799b3e122d92fcb436dedf4ba4e3c284dcd2de8c8730bf08cd226941
Message ID: <19970630154000.3345.qmail@nym.alias.net>
Reply To: N/A
UTC Datetime: 1997-06-30 16:07:22 UTC
Raw Date: Tue, 1 Jul 1997 00:07:22 +0800

Raw message

From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Tue, 1 Jul 1997 00:07:22 +0800
To: cypherpunks@toad.com
Subject: Re: Australian "Walsh" report exposes the hole in key escrow
Message-ID: <19970630154000.3345.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain




John Davidson wrote:
> The US National Institute of Standards and Technology recently made a 
> worldwide plea for cryptography algorithms that can be used for 
> authentication and not for encryption. 
     
  And, of course, cannot be used to authenticate encryption keys. Oh, but
they're just binary data, aren't they? So those Evil Terrorists(tm) will
simply use their magic authentication-only keys to authenticate their
secret un-surrendered encryption keys and they're off.

SignatureMonger






Thread