1998-12-10 - Re: Wassenaar summary (and a funny new loophole)

Header Data

From: Ben Laurie <ben@algroup.co.uk>
To: “Ulf M�ller” <ulf@fitug.de>
Message Hash: 918b243d57997db3b25353dce21517e04ae610479992478065fb34137595cc28
Message ID: <36701BB5.BB2D78CC@algroup.co.uk>
Reply To: <199812101815.TAA120782@public.uni-hamburg.de>
UTC Datetime: 1998-12-10 19:58:31 UTC
Raw Date: Fri, 11 Dec 1998 03:58:31 +0800

Raw message

From: Ben Laurie <ben@algroup.co.uk>
Date: Fri, 11 Dec 1998 03:58:31 +0800
To: "Ulf Mller" <ulf@fitug.de>
Subject: Re: Wassenaar summary (and a funny new loophole)
In-Reply-To: <199812101815.TAA120782@public.uni-hamburg.de>
Message-ID: <36701BB5.BB2D78CC@algroup.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



Ulf Mller wrote:
> Since the definition differentiates algorithms by symmetry rather than by
> their cryptographic properties, there is no restriction whatsoever on
> asymmetric secret-key encryption algorithms. Those algorithms typically
> are not based on factorization or discrete logarithms. That is, they are
> no longer controlled by the Wassenaar arrangement.

Hmm - so if I defined a new crytpo algorithm, SED3, say, that looks like
this:

SED3(k,x)=3DES(backwards(k),x)

where backwards(k) is k with its bits written backwards, then the
3DES/SED3(k1,k2) combination is exportable (where k1 is related to k2,
of course, by k2=backwards(k1))?

Cheers,

Ben.

-- 
Ben Laurie            |Phone: +44 (181) 735 0686| Apache Group member
Freelance Consultant  |Fax:   +44 (181) 735 0689|http://www.apache.org/
and Technical Director|Email: ben@algroup.co.uk |
A.L. Digital Ltd,     |Apache-SSL author     http://www.apache-ssl.org/
London, England.      |"Apache: TDG" http://www.ora.com/catalog/apache/





Thread