So, NSA can break 64-bit keys
Mark C. Henderson
mch at squirrel.com
Sat Aug 19 13:19:04 PDT 1995
On Aug 19, 6:40, Duncan Frissell wrote:
> I guess this means no source code. Are there any software encryption
> systems that can't be modified after the fact?
Undoubtedly, they'll set things up so that if one modifies the
software to break the escrow feature, one won't be able to
interoperate with "legitimate" users (i.e. those who haven't
disabled the escrow feature).
--
Mark Henderson -- markh at wimsey.bc.ca, henderso at netcom.com, mch at squirrel.com
PGP 1024/C58015E3 fingerprint=21 F6 AF 2B 6A 8A 0B E1 A1 2A 2A 06 4A D5 92 46
cryptography archive maintainer -- ftp://ftp.wimsey.com/pub/crypto
ftp://ftp.netcom.com/pub/he/henderso/change-sun-hostid-1.4.8.tar.gz
More information about the Testlist
mailing list