I can't remember the exact details, so could someone give me a quick refresher- which of the following are considered ok under ITAR? MD5 as a checksum keyed MD5 for authentication keyed MD5 as a stream cypher Thanks Simon --- (defun modexpt (x y n) "computes (x^y) mod n" (cond ((= y 0) 1) ((= y 1) (mod x n)) ((evenp y) (mod (expt (modexpt x (/ y 2) n) 2) n)) (t (mod (* x (modexpt x (1- y) n)) n))))