1998-10-17 - Re: Cyptography in the Information Age

Header Data

From: Declan McCullagh <declan@well.com>
To: mail2news_nospam-19981016-sci.crypt@anon.lcs.mit.edu
Message Hash: 0836efb18853313ad4727a5f3da880ad78aaebe0e29f8ad383b6f56fbf7844c8
Message ID: <199810170458.VAA00701@smtp.well.com>
Reply To: <19981016.210815.-1026785.0.Steve.Benjamin@juno.com>
UTC Datetime: 1998-10-17 05:25:39 UTC
Raw Date: Sat, 17 Oct 1998 13:25:39 +0800

Raw message

From: Declan McCullagh <declan@well.com>
Date: Sat, 17 Oct 1998 13:25:39 +0800
To: mail2news_nospam-19981016-sci.crypt@anon.lcs.mit.edu
Subject: Re: Cyptography in the Information Age
In-Reply-To: <19981016.210815.-1026785.0.Steve.Benjamin@juno.com>
Message-ID: <199810170458.VAA00701@smtp.well.com>
MIME-Version: 1.0
Content-Type: text/plain



Let me know if you get arrested. I'll write about it.

-Declan



At 09:08 PM 10-16-98 -0400, Stephen Benjamin wrote:
>X-Posted: sci.crypt, cypherpunks mailing list
>
>For my Advanced Computer Science course in school I'm required to do
>a research paper each quarter.  I have decided to do this quarter's
>paper on Cyptography in the Information Age.
>
>My paper will contain a 6-line (perl) implemenation of
>RSA.	Is my report subject to current Encryption Laws?
>If so, which ones? I plan on making a big deal out of
>how a 15 page research paper can't be exported from the U.S.A.
>
>Also, How can I generate RSA keys in perl?
>I found a C program to do it, but I don't have C installed.
>
>Thanks for any help you can give me! and please reply
>through e-mail!
>
>----------------------------------------------------------
>Stephen Benjamin
>E-mail address: Stephen {DOT} Benjamin {AT} juno {DOT} com
>----------------------------------------------------------
> 





Thread