From: Kent Crispin <kent@songbird.com>
To: cypherpunks@toad.com
Message Hash: 5c2e30fa18e8f75b9bbdeb7fc8c9f4cfec93c6cc34c80e231759c3b8ad3d78e3
Message ID: <19980727141055.63396@songbird.com>
Reply To: <3.0.3.32.19980720114859.009997f0@dave.bbn.com>
UTC Datetime: 1998-07-27 21:13:12 UTC
Raw Date: Mon, 27 Jul 1998 14:13:12 -0700 (PDT)
From: Kent Crispin <kent@songbird.com>
Date: Mon, 27 Jul 1998 14:13:12 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <3.0.3.32.19980720114859.009997f0@dave.bbn.com>
Message-ID: <19980727141055.63396@songbird.com>
MIME-Version: 1.0
Content-Type: text/plain
On Wed, Jul 22, 1998 at 06:18:30AM -0700, John Gilmore wrote:
> > One lesson I plan to observe - don't encrypt known plaintext unless you
> > have to !
>
> The EFF DES Cracker cracks more than just known plaintext (though it's
> the easy case).
It occurs to me that an interesting use for the eff des cracker would
be the following: since the government asserts that DES is safe, then
a DES encrypted archive of crypto code should be exportable. So the
next time someone feels the need to export something that is currently
not exportable, simply encrypt it, along with some plaintext, with
DES, trash the key, export it, and send the plaintext and the
encrypted plaintext to the EFF...
This is not a practical use, but it would make an interesting test
case in court.
--
Kent Crispin, PAB Chair "No reason to get excited",
kent@songbird.com the thief he kindly spoke...
PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html
Return to July 1998
Return to ““William H. Geiger III” <whgiii@openpgp.net>”