Data Insecurity Packages, etc.
Eric Hughes
hughes at soda.berkeley.edu
Fri May 28 21:39:02 PDT 1993
>It has also been examined by four cryptologists (professional and/or
>credentialed) not involved in its development, and it was ridiculed
>by none of them.
I hear the sounds of autonecrothaphty (digging one's own grave). Was
it recommended by any of them, and did any of the test it?
>The first task of a cryptanalyst
>is to discover what method of encryption was used.
Usually not. This often comes as collateral information related to
the intercept. In the case of a PC seizure, having a manual lying
around and an executable on the disk usually qualifies.
Eric
More information about the cypherpunks-legacy
mailing list