1998-01-20 - Taxonomy of crypto applications

Header Data

From: David Honig <honig@otc.net>
To: cypherpunks@toad.com
Message Hash: 4f8ff73a558503b960782b55be737fe6e5e561980d2ea2f22ea58869bdcb595c
Message ID: <3.0.5.32.19980120101359.007c6c10@206.40.207.40>
Reply To: N/A
UTC Datetime: 1998-01-20 18:30:35 UTC
Raw Date: Wed, 21 Jan 1998 02:30:35 +0800

Raw message

From: David Honig <honig@otc.net>
Date: Wed, 21 Jan 1998 02:30:35 +0800
To: cypherpunks@toad.com
Subject: Taxonomy of crypto applications
Message-ID: <3.0.5.32.19980120101359.007c6c10@206.40.207.40>
MIME-Version: 1.0
Content-Type: text/plain





Trying to make sense of the various applications of crypto,
I came up with an illustration of their 'dependancies' at
	http://rattler.otc.net/crypto/mydocs/taxonomy.gif
This picture illustrates topics that you should learn
before others.

For instance, digital watermarking depends on steganography
and message-authentication codes.  Anonymity requires
understanding traffic mixing and practical encryption; practical
encryption requires understanding public and secret key encryption.

FWIW.  Comments welcome.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig@otc.net                  Intaanetto Jigyoubu

	"How do you know you are not being deceived?" 
	---A Compendium of Analytic TradeCraft Notes, 
	     Directorate of Intelligence, CIA
	     http://www.jya.com/cia-notes.htm

















Thread