1997-12-06 - Re: Please Beta test my communications cryptography product.

Header Data

From: “James A. Donald” <jamesd@echeque.com>
To: Rick Smith <cryptography@c2.net
Message Hash: 3774da6ad205b4d2a186838056ebff7fae16a2cf6d4c9e52794842b1fd193659
Message ID: <199712060843.AAA20121@proxy3.ba.best.com>
Reply To: N/A
UTC Datetime: 1997-12-06 08:53:29 UTC
Raw Date: Sat, 6 Dec 1997 16:53:29 +0800

Raw message

From: "James A. Donald" <jamesd@echeque.com>
Date: Sat, 6 Dec 1997 16:53:29 +0800
To: Rick Smith <cryptography@c2.net
Subject: Re: Please Beta test my communications cryptography product.
Message-ID: <199712060843.AAA20121@proxy3.ba.best.com>
MIME-Version: 1.0
Content-Type: text/plain



At 04:19 PM 12/5/97 -0600, Rick Smith wrote:
> I admit I can't figure out what crypto mechanism Kong is really using since
> there's obfuscating talk of passphrases and secrets. 

Your secret key is 240 bit number modulo the order of the generator.  This
number is generated by hashing your secret file and passphrase.

Your public key is an elliptic point, equal to the secret key times 
the generator.

 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/






Thread