A Challenge (perhaps!)

Mike McNally m5 at dev.tivoli.com
Thu Feb 22 06:20:33 PST 1996



Bruce Baugh writes:
 > >I know it doesn't exercise key technology and relies on the secrecy of the
 > >algorithm (which from my very limited knowledge on cryptography I think makes
 > >it almost doomed from the start (?))... 
 > 
 > Yes, it does. 

The way I like to think of such a scheme is to consider the secret
algorithm itself to be the key, which then drives the cryptosystem
composed of the CPU instruction sequencer on the encrypting machine.
Thus all messages are encrypted with the same key; it should be easy
to see why that isn't secure.

______c_____________________________________________________________________
Mike M Nally * Tiv^H^H^H IBM * Austin TX    * I want more, I want more,
       m5 at tivoli.com * m101 at io.com          * I want more, I want more ...
      <URL:http://www.io.com/~m101>         *_______________________________






More information about the cypherpunks-legacy mailing list