From: Eric Cordian <emc@wire.insync.net>
To: cypherpunks@cyberpass.net
Message Hash: a1b825a1d8a06a45cbba2e5b14b151065b84d4c803c22231cf756e1ddf185cc2
Message ID: <199810232323.SAA02700@wire.insync.net>
Reply To: N/A
UTC Datetime: 1998-10-23 23:44:24 UTC
Raw Date: Sat, 24 Oct 1998 07:44:24 +0800
From: Eric Cordian <emc@wire.insync.net>
Date: Sat, 24 Oct 1998 07:44:24 +0800
To: cypherpunks@cyberpass.net
Subject: ITAR and Codebreaking
Message-ID: <199810232323.SAA02700@wire.insync.net>
MIME-Version: 1.0
Content-Type: text/plain
Does anyone know how ITAR applies to cryptographic source code which can
not directly be used to encrypt or decrypt files?
Specifically, do we need to do some horrible export-controlled thing for
source code which contains a very straightforward reference implementation
of DES, and whose output is a file of integers defining a satisfiability
problem instantated for a specific plaintext/ciphertext pair?
If the answer to this question is "yes," would someone be willing to
donate a few meg on an export-controlled crypto site that we could link
to?
Many thanks.
--
Sponsor the DES Analytic Crack Project
http://www.cyberspace.org/~enoch/crakfaq.html
Return to October 1998
Return to “Eric Cordian <emc@wire.insync.net>”
1998-10-23 (Sat, 24 Oct 1998 07:44:24 +0800) - ITAR and Codebreaking - Eric Cordian <emc@wire.insync.net>