NSA, ITAR, NCSA and plug-in hooks.
Jiri Baum
jirib at sweeney.cs.monash.edu.au
Wed Nov 15 21:59:41 PST 1995
-----BEGIN PGP SIGNED MESSAGE-----
Hello Rich Salz <rsalz at osf.org>
and rsalz at osf.org, ses at tipper.oit.unc.edu
and cypherpunks at toad.com, owner-cypherpunks at toad.com,
and s1113645 at tesla.cc.uottawa.ca
...
> >are specifically designed for the insertion of cryptographic materials,
> >or is it the fact that they could be used to support cryptographic
...
> Basically, generic buffer-manipulation is okay. "Keyed compression"
> where you explicitly passed something called a key to a DLL routine
> would be looked on suspiciously.
...
Why would you call it a key?
How about compression "options"? The compression algorithm could
have a "speed" mode and a "size" mode. It could also have options
for file type etc...
Recipient id could be passed along to check which compression
method the recipient knows.
...
> An abstract set of open/modify/close
> routines (where open returned a pointer to opaque state, say a session
> key :) would be fine.
...
So what's the difference... apart from what it's called?
Jiri
- --
If you want an answer, please mail to <jirib at cs.monash.edu.au>.
On sweeney, I may delete without reading!
PGP 463A14D5 (but it's at home so it'll take a day or two)
PGP EF0607F9 (but it's at uni so don't rely on it too much)
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i
iQCVAwUBMKrQSyxV6mvvBgf5AQFUqAP/R3IGOey/1NbyyzTLYgRsrcbQtM1HHc73
PzXijxLJHvCjUTRaHS1feBRJv+dbwAMlH8yO+Q4DKuy5YCdv5f3kJz0Bsyejr8/C
R3JOPSH4nePOGR8rfTK1AUMPQIGn50NXIaNT0OLdVSGU3444W4xruXiqkLlzduBn
2UNLX7DNXls=
=wGpa
-----END PGP SIGNATURE-----
More information about the Testlist
mailing list