Re: Australian "Walsh" report exposes the hole in key escrow

17 Dec
2003
17 Dec
'03
6:17 p.m.
John Davidson wrote:
The US National Institute of Standards and Technology recently made a worldwide plea for cryptography algorithms that can be used for authentication and not for encryption.
And, of course, cannot be used to authenticate encryption keys. Oh, but they're just binary data, aren't they? So those Evil Terrorists(tm) will simply use their magic authentication-only keys to authenticate their secret un-surrendered encryption keys and they're off. SignatureMonger
7748
Age (days ago)
7748
Last active (days ago)
0 comments
1 participants
participants (1)
-
lcs Mixmaster Remailer