From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
To: cypherpunks@toad.com
Message Hash: 677c75e6799b3e122d92fcb436dedf4ba4e3c284dcd2de8c8730bf08cd226941
Message ID: <19970630154000.3345.qmail@nym.alias.net>
Reply To: N/A
UTC Datetime: 1997-06-30 16:07:22 UTC
Raw Date: Tue, 1 Jul 1997 00:07:22 +0800
From: lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>
Date: Tue, 1 Jul 1997 00:07:22 +0800
To: cypherpunks@toad.com
Subject: Re: Australian "Walsh" report exposes the hole in key escrow
Message-ID: <19970630154000.3345.qmail@nym.alias.net>
MIME-Version: 1.0
Content-Type: text/plain
John Davidson wrote:
> The US National Institute of Standards and Technology recently made a
> worldwide plea for cryptography algorithms that can be used for
> authentication and not for encryption.
And, of course, cannot be used to authenticate encryption keys. Oh, but
they're just binary data, aren't they? So those Evil Terrorists(tm) will
simply use their magic authentication-only keys to authenticate their
secret un-surrendered encryption keys and they're off.
SignatureMonger
Return to June 1997
Return to “lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>”
1997-06-30 (Tue, 1 Jul 1997 00:07:22 +0800) - Re: Australian “Walsh” report exposes the hole in key escrow - lcs Mixmaster Remailer <mix@anon.lcs.mit.edu>