gonzo cryptography; how would you improve existing cryptosystems?

Travis H. solinym at gmail.com
Fri Nov 4 18:25:46 PST 2005

> Does ISAKMP do encryption where the input is
> meant to be secret, instead of the key?

I meant MAC, not encryption, sorry.
Of course encryption inputs are secret.
http://www.lightconsulting.com/~travis/  -><-
"We already have enough fast, insecure systems." -- Schneier & Ferguson
GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B

More information about the cypherpunks-legacy mailing list