Australian "Walsh" report exposes the hole in key escrow

lcs Mixmaster Remailer mix at anon.lcs.mit.edu
Mon Jun 30 09:07:22 PDT 1997




John Davidson wrote:
> The US National Institute of Standards and Technology recently made a 
> worldwide plea for cryptography algorithms that can be used for 
> authentication and not for encryption. 
     
  And, of course, cannot be used to authenticate encryption keys. Oh, but
they're just binary data, aren't they? So those Evil Terrorists(tm) will
simply use their magic authentication-only keys to authenticate their
secret un-surrendered encryption keys and they're off.

SignatureMonger







More information about the cypherpunks-legacy mailing list