home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!usc!news.service.uci.edu!ucivax!ofa123!Erik.Lindano
- From: Erik.Lindano@ofa123.fidonet.org
- Newsgroups: sci.crypt
- Subject: New Encryption - a Challenge
- X-Sender: newtout 0.02 Nov 17 1992
- Message-ID: <n0ee7t@ofa123.fidonet.org>
- Date: 18 Nov 92 21:35:10
- Lines: 31
-
- Writes cme@ellisun.sw.stratus.com (Carl Ellison):
-
- > The point which should be made (in the FAQ at least, and probably
- > here) is that the fact that no one reading this group wants to
- > take this time does not imply that the method is secure.
-
- The point should also be made that neither does it mean the opposite.
- In other words, it means neither thing, which leaves me wondering
- why you bothered to make the point.
-
- (Actually, some people _did express_ willingness to try.)
-
- > This attempt goes under the name "security by obscurity" and
- > protects only against lazy attackers. A system which is secure
- > only against lazy attackers isn't worth anything.
-
- If the intention of my original challenge had been what you
- describe, then you might have been right. But my intention was not
- what you describe. My intention was to offer a test and see if
- anyone would willingly participate. No intentional "obscurity" was
- specifically intended.
-
- In any case, OBSCURITY is what cryptanalysis deals with all the
- time, is it not? OBSCURITY is the subject matter of the
- cryptomancer. The objective is either to produce OBSCURITY, or
- to extract light from OBSCURITY.
-
- In this newsgroup, OBSCURITY is definitely not a bad word...
-
-
- --- Maximus 2.00
-