[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: A Challenge (perhaps!)



At 07:46 AM 2/22/96 -0600, m5@dev.tivoli.com (Mike McNally) wrote:

>The way I like to think of such a scheme is to consider the secret
>algorithm itself to be the key, which then drives the cryptosystem
>composed of the CPU instruction sequencer on the encrypting machine.
>Thus all messages are encrypted with the same key; it should be easy
>to see why that isn't secure.

That's a very effective way of putting it. I like that.

As it happens, it appears that I may have persuaded yet another developer
what I Strongly Suspect to be hideously insecure to post info here, or have
me do it. Turns out he's genuinely interested in doing it right. I _really_
hope this turns into a trend :-) - two in one week is pretty nifty. Good
will is a precious thing.

-- 
Bruce Baugh
bruce@aracnet.com
http://www.aracnet.com/~bruce