[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: IMPORTANT: Additional information about UDCM.



Welcome once again to your weekly round of 'Smell that Snake Oil'

> A detailed description of the IMDMP encryption algorithm will be posted to
> this mailing list within a few days. An end-user application will be released
> within a few weeks. I would appreciate it if all you cypherpunks out there
> review the description and the software, and tell me what you think of IMDMP.

This is a good start.  You would do well to keep your wild claims to a
minimum until after the first cursory reviews.

> are referenced more often than "bytes". And, the "industry standard" that
> IMDMP is obviously well above is DES, etc. Also, DES 128, PGP 1024, RSA 128,
> IDEA 128, and IMDMP 2048 were applied at their maximum settings on a file

DES 128 - no such beast
PGP 1024 - this is presumably a RSA key size, and has nothing
to do with the session key involved in actually encrypting the data
RSA 128 - RSA is not suited to encrypting streams of data but if
you wanted to use it for that purpose 128bits would be ridiculusly
to small to be secure
IDEA 128 - wow, you've actually named one real block cipher!
IMDMP 2048 - feh

> full of about 64 *million* repeating "A" ASCII character bytes. The mutation
> levels the algorithms rendered on their individual trash test files were
> compared. Subtle patterns where searched for. Binary character tallys where
> taken. IMDMP did *not* leave *any* repeating patterns in the test file that
> was used. In IMDMP, each of the 256 possible binary character combinations
> had an approximate count of  0.390625% of all of the 64 million bytes.
>  0.390625% is the best possible percentage. 

The fact that you would consider this to be a sufficient test is proof enough
for me that you should not be designing cryptosystems.

> Are all of you out there
> satisfied?

Not even close.

-Blake 
(who's waiting for the first pyramid-scheme cipher to be announced here next week)