So, NSA can break 64-bit keys

Mark C. Henderson mch at squirrel.com
Sat Aug 19 13:19:04 PDT 1995


On Aug 19,  6:40, Duncan Frissell wrote:
> I guess this means no source code.  Are there any software encryption
> systems that can't be modified after the fact?

Undoubtedly, they'll set things up so that if one modifies the 
software to break the escrow feature, one won't be able to 
interoperate with "legitimate" users (i.e. those who haven't 
disabled the escrow feature). 


-- 
Mark Henderson -- markh at wimsey.bc.ca, henderso at netcom.com, mch at squirrel.com
PGP 1024/C58015E3 fingerprint=21 F6 AF 2B 6A 8A 0B E1 A1 2A 2A 06 4A D5 92 46
cryptography archive maintainer  --  ftp://ftp.wimsey.com/pub/crypto
ftp://ftp.netcom.com/pub/he/henderso/change-sun-hostid-1.4.8.tar.gz






More information about the cypherpunks-legacy mailing list