From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: Ben Laurie <ben@algroup.co.uk>
Message Hash: 57ff4fef6e31025fe3c929093385b43cbe6662709b1a80bfbaf3a11217ef42fe
Message ID: <367769EF.251F7294@stud.uni-muenchen.de>
Reply To: <3676B5B3.E37D80C@stud.uni-muenchen.de>
UTC Datetime: 1998-12-16 08:33:49 UTC
Raw Date: Wed, 16 Dec 1998 16:33:49 +0800
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Wed, 16 Dec 1998 16:33:49 +0800
To: Ben Laurie <ben@algroup.co.uk>
Subject: Re: WEAK3-EX -- A Layman's 56-bit Data Encryption Algorithm
In-Reply-To: <3676B5B3.E37D80C@stud.uni-muenchen.de>
Message-ID: <367769EF.251F7294@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain
Ben Laurie wrote:
>
> Mok-Kong Shen wrote:
> > P.S. For space and obvious reasons, I plan to remove the code and
> > binaries of WEAK1, WEAK2, WEAK3 and WEAK3-E from my Web page this
> > Friday, leaving in future WEAK3-EX the single encryption software
> > accessible.
>
> Hmm. The "obvious reasons" being one or more of the following:
>
> a) You think people shouldn't be allowed strong crypto
> b) You think the US shouldn't have to go to the trouble of getting laws
> changed, we should just obey their whims voluntarily
> c) You are on the NSA's payroll
I didn't want to incur two matters (hence my way of formulation):
1. The law would sometime be effective in my country without my
immediately noticing it and I'll get trobles.
2. I am not sure that my stuff is really strong. Saying that I
have to delete because it is strong is claiming something
at least very subjectively and anyway not scientific.
Do you understand now?
M. K. Shen
Return to December 1998
Return to “Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>”