1998-10-23 - ITAR and Codebreaking

Header Data

From: Eric Cordian <emc@wire.insync.net>
To: cypherpunks@cyberpass.net
Message Hash: a1b825a1d8a06a45cbba2e5b14b151065b84d4c803c22231cf756e1ddf185cc2
Message ID: <199810232323.SAA02700@wire.insync.net>
Reply To: N/A
UTC Datetime: 1998-10-23 23:44:24 UTC
Raw Date: Sat, 24 Oct 1998 07:44:24 +0800

Raw message

From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 24 Oct 1998 07:44:24 +0800
To: cypherpunks@cyberpass.net
Subject: ITAR and Codebreaking
Message-ID: <199810232323.SAA02700@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain



Does anyone know how ITAR applies to cryptographic source code which can
not directly be used to encrypt or decrypt files?

Specifically, do we need to do some horrible export-controlled thing for
source code which contains a very straightforward reference implementation
of DES, and whose output is a file of integers defining a satisfiability
problem instantated for a specific plaintext/ciphertext pair? 

If the answer to this question is "yes," would someone be willing to
donate a few meg on an export-controlled crypto site that we could link
to?

Many thanks. 

-- 
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html






Thread