[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
The Key for the IPG 200 Megabytes at NETPRIVACY.COM
In response to the numerous requests for us to post the key that we used
to produce the almost 200 megabytes of raw encryptor stream at our web
site, we are pleased to provide the ASCII values of same as follows:
OFFSET 0 1 2 3 4 5 6 7 8 9
0 237 55 181 123 98 190 172 218 32 95
1 76 254 70 151 109 109 115 87 146 142
2 233 129 176 197 154 22 122 168 96 9
3 115 234 241 54 78 120 81 33 128 196
4 177 8 69 53 71 116 0 245 126 158
5 29 239 80 219 86 236 193 50 7 31
6 84 188 5 215 175 213 222 4 180 144
7 187 162 205 215 60 144 120 75 195 66
8 178 81 212 56 123 177 189 113 101 91
9 211 194 48 171 17 64 197 118 148 24
10 32 67 114 171 26 131 19 149 121 32
11 235 112 114 45 28 80 37 142 138 15
12 229 228 155 214 66 246 174 195 224 215
13 116 233 106 209 66 233 175 229 244 245
14 74 81 136 163 100 21 114 240 48 184
15 124 151 145 74 34 33 14 70 132 37
16 82 253 70 97 72 20 106 41 162 30
17 136 18 105 227 219 232 121 49 119 218
18 6 97 193 180 228 204 92 158 116 222
19 145 91 34 200 199 235 178 116 103 196
20 79 104 90 22 69 212 91 65 171 133
21 92 208 76 127 37 83 92 140 27 249
22 229 22 132 205 5 67 203 8 196 141
23 136 80 68 156 228 38 254 97 170 179
24 43 152 124 172 91 52 79 94 248 131
25 202 82 36 41 11 229
As explained at the web site, that key is expanded to an 8192 byte key and
used as described therein.
www.netprivacy.com
In order for those few who have not had the opportunity to check it out,
we will leave it up another week and then take it down and put up a
new shorter one, maybe a 2,560,000 byte one permanently and a monthly
2,560,000 byte one where we publish the key each month.
Of course, no university, coderpunk, or cypherpunk, or any collection of
same, has broken the system, nor will they ever. As most of you now
know, it is absolutely unbreakable. We have had over 100 universities,
IBM, Microsoft, Intel, hundreds of other corporations, several dozen
different government agencies, and thousands of other individuals to
download the data and look at the algorithm. Of course, like everyone
else, they have been benighted, even if some of them will not own up to
it.
Several people have requested me to provide a narrative description of the
algorithm explaining why the raw encryptor output stream seems to be so
remarkably random. I am preparing such a document and it should be ready
next week, or the week after. I will post it accordingly.
Thanks so very much,
Don Wood