[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

The Key for the IPG 200 Megabytes at NETPRIVACY.COM




In response to the numerous requests for us to post the key that we used
to produce the almost 200 megabytes of raw encryptor stream at our web
site, we are pleased to provide the ASCII values of same as follows: 



OFFSET    0   1   2   3   4   5   6   7   8   9
    0    237  55 181 123  98 190 172 218  32  95 
    1     76 254  70 151 109 109 115  87 146 142 
    2    233 129 176 197 154  22 122 168  96   9 
    3    115 234 241  54  78 120  81  33 128 196 
    4    177   8  69  53  71 116   0 245 126 158 
    5     29 239  80 219  86 236 193  50   7  31 
    6     84 188   5 215 175 213 222   4 180 144 
    7    187 162 205 215  60 144 120  75 195  66 
    8    178  81 212  56 123 177 189 113 101  91 
    9    211 194  48 171  17  64 197 118 148  24 
   10     32  67 114 171  26 131  19 149 121  32 
   11    235 112 114  45  28  80  37 142 138  15 
   12    229 228 155 214  66 246 174 195 224 215 
   13    116 233 106 209  66 233 175 229 244 245 
   14     74  81 136 163 100  21 114 240  48 184 
   15    124 151 145  74  34  33  14  70 132  37 
   16     82 253  70  97  72  20 106  41 162  30 
   17    136  18 105 227 219 232 121  49 119 218 
   18      6  97 193 180 228 204  92 158 116 222 
   19    145  91  34 200 199 235 178 116 103 196 
   20     79 104  90  22  69 212  91  65 171 133 
   21     92 208  76 127  37  83  92 140  27 249 
   22    229  22 132 205   5  67 203   8 196 141 
   23    136  80  68 156 228  38 254  97 170 179 
   24     43 152 124 172  91  52  79  94 248 131 
   25    202  82  36  41  11 229 

As explained at the web site, that key is expanded to an 8192 byte key and
used as described therein.

                    www.netprivacy.com

In order for those few who have not had the opportunity to check it out,
we will leave it up another week and then take it down and put up a
new shorter one, maybe a 2,560,000 byte one permanently and a monthly
2,560,000 byte one where we publish the key each month. 

Of course, no university, coderpunk, or cypherpunk, or any collection of
same,  has broken the system, nor will they ever.  As most of you now
know, it is absolutely unbreakable. We have had over 100 universities,
IBM, Microsoft, Intel, hundreds of other corporations, several dozen
different government agencies, and thousands of other individuals to
download the data and look at the algorithm. Of course, like everyone
else, they have been benighted, even if some of them will not own up to
it.

Several people have requested me to provide a narrative description of the
algorithm explaining why the raw encryptor output stream seems to be so
remarkably random. I am preparing such a document and it should be ready
next week, or the week after. I will post it accordingly.

Thanks so very much, 

Don Wood