FAQ on legalities SSLeay, &c.

P. J. Ponder ponder at freenet.tlh.fl.us
Fri Nov 22 19:15:20 PST 1996


the recently posted FAQ on crytpo patent expiration dates etc. stated that
MD5 and SHA were not export-restricted anywhere.  The FIPS Pub for SHA
(which I think is numbered 180-1) specifically states that SHA is export
controlled (by ITAR).  I asked this list why it would be controlled, since
it was a signature function, and Perry Metzger replied that crypto hash 
functions make good starting points for building a block cipher program.  

there is a section in Schneier's _Applied Crypto_ on this, too.

anybody heard from the old Perry-grammer on his list project?
I miss him.  He would be having a field day with all this noise.

surprised there hasn't been more chatter about the improved differential 
fault analysis (IDFA).  That is pretty powerful stuff.  They just don't 
make tamper-proof like they used to.  Forget chomping on the keyspace, 
read the modulus and divide by the public key.  I like the reference to 
the 'Mafia EFT/POS'.

ObSciFi:  Go back and read the Preface (by Bruce Sterling) to Gibson's 
_Burning Chrome_ collection.  He talks about the sorry state of SF in the 
1980's and how Gibson, among others, was turning out something new. Hmph.






More information about the Testlist mailing list