[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Dolphin Encrypt
- To: [email protected] (cypherpunks)
- Subject: Dolphin Encrypt
- From: Anonymous <[email protected]>
- Date: Mon, 18 Apr 1994 15:24:32 -0400
- Comments: This message was automatically remailed by an anonymous contact service. Direct replies to this message will be non-anonymously forwarded to the original sender. For anonymous replies, use the mg5n+an... format. For more information, send mail to [email protected] Please report problems to [email protected]
- Sender: [email protected]
> Real? "Anonymous" here reveals that he has not been keeping up with
> the literature. DE was examined critically by Prof. Cipher Deavours
> in the October 1993 issue of Cryptologia, who (after studying the C
> source code for the encryption algorithm) wrote: "The diffusion
Is what you are saying, Mr. Davidson, that "Prof. Cipher Deavours" is
sufficient critical examination?
This argument boils down to "well, we had this one group look and it
and they couldn't break it, therefore, it is secure."
> For all we know Eric himself posted that "anonymous" message, so he
> could quote him out of context. As I recall, Anonymous seemed to have
> (deliberately?) misunderstood the part about the statistical test (and
> Eric agrees with him).
This is not Eric Hughes.
What did I misunderstand about the statistical test? I read about a
weak system versus a 2000 byte file, and Dolphin Encrypt versus a
60000 byte file. No description of what the files were was evident.
If the authors have such high cryptographic skills, then perhaps they
can show the results of differential cryptanalysis (or linear
cryptanalysis, etc.) on Dolphin Encrypt, rather than some completely
bogus statistical test like the one displayed.