Graphic encryption

Rev. Mark Grant mark at unicorn.com
Fri Oct 6 09:35:14 PDT 1995


On Fri, 6 Oct 1995, Lucky Green wrote:

>And by the way, "proprietary" algorithms are generally junk and should not
>be relied upon by security concious individuals and businesses. Only
>algorithms that have undergone extensive peer review should be considered
>for use.

It's OK, when these guys were spamming Usenet a few weeks ago with their 
product announcement (admittedly, they did at least keep it to comp 
groups) they said it was export-approved. Therefore, it can be pretty 
much written off from a security standpoint - it's at best as good as 
40-bit RC4, and I sure wouldn't use that for secure communications.

I'd still like to know how it works so we can see just how insecure it 
is, though.

	Mark







More information about the cypherpunks-legacy mailing list