From: David Honig <honig@otc.net>
To: cypherpunks@toad.com
Message Hash: 4f8ff73a558503b960782b55be737fe6e5e561980d2ea2f22ea58869bdcb595c
Message ID: <3.0.5.32.19980120101359.007c6c10@206.40.207.40>
Reply To: N/A
UTC Datetime: 1998-01-20 18:30:35 UTC
Raw Date: Wed, 21 Jan 1998 02:30:35 +0800
From: David Honig <honig@otc.net>
Date: Wed, 21 Jan 1998 02:30:35 +0800
To: cypherpunks@toad.com
Subject: Taxonomy of crypto applications
Message-ID: <3.0.5.32.19980120101359.007c6c10@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain
Trying to make sense of the various applications of crypto,
I came up with an illustration of their 'dependancies' at
http://rattler.otc.net/crypto/mydocs/taxonomy.gif
This picture illustrates topics that you should learn
before others.
For instance, digital watermarking depends on steganography
and message-authentication codes. Anonymity requires
understanding traffic mixing and practical encryption; practical
encryption requires understanding public and secret key encryption.
FWIW. Comments welcome.
------------------------------------------------------------
David Honig Orbit Technology
honig@otc.net Intaanetto Jigyoubu
"How do you know you are not being deceived?"
---A Compendium of Analytic TradeCraft Notes,
Directorate of Intelligence, CIA
http://www.jya.com/cia-notes.htm
Return to January 1998
Return to “David Honig <honig@otc.net>”
1998-01-20 (Wed, 21 Jan 1998 02:30:35 +0800) - Taxonomy of crypto applications - David Honig <honig@otc.net>