Dolphin Encrypt

Stanton McCandlish anton at hydra.unm.edu
Wed May 19 05:39:12 PDT 1993


<tried to email this, but it bounced>

I too would like more info on this subject!  Guess all us yokels at UNM are
clueless or something.  My question is, how does the recipient get the key,
and how do they (she, whatever) know to use that long de command? What would
happend if they didn't, just get gibberish?

> 
> The recipient captures the entire message as, say, G.ENC, then runs:
> 
>                        DE D G.ENC G.DEC /t
> 
> (Of course, she has to know the encryption key.)  Dolphin Encrypt
> skips over P1 to get at C2 and writes G.DEC containing P2.  Voila!
> 
> For further info send me a snailmail address.

See below for snail address...

-- 
Testes saxi solidi!  **********************   Podex opacus gravedinosus est!  
Stanton McCandlish,  SysOp:  Noise in the Void Data Center BBS
IndraNet: 369:1/1      FidoNet: 1:301/2      Internet: anton at hydra.unm.edu
Snail: 8020 Central SE #405, Albuquerque, New Mexico 87108 USA
Data phone: +1-505-246-8515 (24hr, 1200-14400 v32bis, N-8-1)
Vox phone:  +1-505-247-3402 (bps rate varies, depends on if you woke me up...:)






More information about the cypherpunks-legacy mailing list