1998-08-21 - QUestion….

Header Data

From: “Bernardo B. Terrado” <bbt@mudspring.uplb.edu.ph>
To: Anonymous <nobody@replay.com>
Message Hash: 746b9347f6bf4c7dcb6ca7a5b1032a83f2d41cd8a2891c283998749ff1812fd9
Message ID: <Pine.GSO.3.96.980820171333.20689A-100000@mudspring.uplb.edu.ph>
Reply To: <199808031315.PAA15001@replay.com>
UTC Datetime: 1998-08-21 10:06:38 UTC
Raw Date: Fri, 21 Aug 1998 03:06:38 -0700 (PDT)

Raw message

From: "Bernardo B. Terrado" <bbt@mudspring.uplb.edu.ph>
Date: Fri, 21 Aug 1998 03:06:38 -0700 (PDT)
To: Anonymous <nobody@replay.com>
Subject: QUestion....
In-Reply-To: <199808031315.PAA15001@replay.com>
Message-ID: <Pine.GSO.3.96.980820171333.20689A-100000@mudspring.uplb.edu.ph>
MIME-Version: 1.0
Content-Type: text/plain

Are there only two techniques in encrypting a data?
(transposition and substitution?)

Could you give me one algorithm better than DES and RSA?

Thank you.

It's me Bernie.

It's funny, I have always been a good 
	listener who understood and cared
		someones secrets, but to my dismay 
			I have never been understood.