home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!news.larc.nasa.gov!news.larc.nasa.gov!palmer
- From: palmer@icat.larc.nasa.gov (Michael T. Palmer)
- Newsgroups: sci.crypt
- Subject: Re: Here's a challenge
- Date: 11 Jan 93 14:44:56 GMT
- Organization: NASA Langley Research Center, Hampton, VA USA
- Lines: 34
- Message-ID: <palmer.726763496@news.larc.nasa.gov>
- References: <1993Jan11.021259.10637jp@tygra.Michigan.COM>
- NNTP-Posting-Host: icat.larc.nasa.gov
-
- jp@tygra.Michigan.COM (John Palmer) writes:
-
- >I want to check out some components of an encryption system that I'm
- >using and would like to see if anyone can crack this encrypted file.
- >Only hint is that its text of some kind. I've uuencoded it.
-
- [encrypted text deleted]
-
- John -
-
- Please read the sci.crypt FAQ. Keeping your algorithm a secret is
- no good, because if we really wanted to crack your file we'd break into
- your house or apartment first to get everything off your hard disk, and
- then try to tap all your email to see if you mentioned anything relevant.
- "Security by Obscurity" is a fallacy. The encryption system is only
- secure if *everyone* knows how it works, and cannot find any flaws.
-
- Otherwise, you only *think* it's secure, when in fact someone who knows
- how it works has already told the "bad guys." Believe it - anyone who
- really wants to know more about how your encryption system works WILL FIND
- OUT whether you know about it or not.
-
- Sorry, but you probably won't get any takers unless you either supply
- the algorithm or make it worth the time by offering a financial incentive.
-
- Of course, if it's simple someone who's bored might give it a shot with
- the standard attacks.
-
- Good luck!
-
- --
- Michael T. Palmer, M/S 152, NASA Langley Research Center, Hampton, VA 23681
- Voice: 804-864-2044, FAX: 804-864-7793, Email: m.t.palmer@larc.nasa.gov
- RIPEM Public Key now available -- Consider it an envelope for your e-mail
-