The Key for the IPG 200 Megabytes at NETPRIVACY.COM

In response to the numerous requests for us to post the key that we used to produce the almost 200 megabytes of raw encryptor stream at our web site, we are pleased to provide the ASCII values of same as follows: OFFSET 0 1 2 3 4 5 6 7 8 9 0 237 55 181 123 98 190 172 218 32 95 1 76 254 70 151 109 109 115 87 146 142 2 233 129 176 197 154 22 122 168 96 9 3 115 234 241 54 78 120 81 33 128 196 4 177 8 69 53 71 116 0 245 126 158 5 29 239 80 219 86 236 193 50 7 31 6 84 188 5 215 175 213 222 4 180 144 7 187 162 205 215 60 144 120 75 195 66 8 178 81 212 56 123 177 189 113 101 91 9 211 194 48 171 17 64 197 118 148 24 10 32 67 114 171 26 131 19 149 121 32 11 235 112 114 45 28 80 37 142 138 15 12 229 228 155 214 66 246 174 195 224 215 13 116 233 106 209 66 233 175 229 244 245 14 74 81 136 163 100 21 114 240 48 184 15 124 151 145 74 34 33 14 70 132 37 16 82 253 70 97 72 20 106 41 162 30 17 136 18 105 227 219 232 121 49 119 218 18 6 97 193 180 228 204 92 158 116 222 19 145 91 34 200 199 235 178 116 103 196 20 79 104 90 22 69 212 91 65 171 133 21 92 208 76 127 37 83 92 140 27 249 22 229 22 132 205 5 67 203 8 196 141 23 136 80 68 156 228 38 254 97 170 179 24 43 152 124 172 91 52 79 94 248 131 25 202 82 36 41 11 229 As explained at the web site, that key is expanded to an 8192 byte key and used as described therein. www.netprivacy.com In order for those few who have not had the opportunity to check it out, we will leave it up another week and then take it down and put up a new shorter one, maybe a 2,560,000 byte one permanently and a monthly 2,560,000 byte one where we publish the key each month. Of course, no university, coderpunk, or cypherpunk, or any collection of same, has broken the system, nor will they ever. As most of you now know, it is absolutely unbreakable. We have had over 100 universities, IBM, Microsoft, Intel, hundreds of other corporations, several dozen different government agencies, and thousands of other individuals to download the data and look at the algorithm. Of course, like everyone else, they have been benighted, even if some of them will not own up to it. Several people have requested me to provide a narrative description of the algorithm explaining why the raw encryptor output stream seems to be so remarkably random. I am preparing such a document and it should be ready next week, or the week after. I will post it accordingly. Thanks so very much, Don Wood
participants (1)
-
wichita@cyberstation.net