home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky sci.crypt:3138 alt.security:4284
- Path: sparky!uunet!olivea!spool.mu.edu!wupost!gumby!destroyer!ubc-cs!unixg.ubc.ca!physics.ubc.ca!unruh
- From: unruh@physics.ubc.ca (William Unruh)
- Newsgroups: sci.crypt,alt.security
- Subject: Re: Are DES restriction even logically sound?
- Message-ID: <unruh.715917768@physics.ubc.ca>
- Date: 8 Sep 92 02:02:48 GMT
- References: <1992Sep5.164646.21443@uwm.edu> <Bu5597.3x4@sneaky.lonestar.org> <1992Sep7.225615.18289@gandalf.UMCS.Maine.EDU>
- Sender: news@unixg.ubc.ca (Usenet News Maintenance)
- Organization: University of British Columbia, Vancouver, B.C., Canada
- Lines: 12
- Nntp-Posting-Host: physics.ubc.ca
-
- who@gandalf.UMCS.Maine.EDU (William H. Owen) writes:
-
-
- > There is a nice version of DES in pascal included in "Computer Networks"
- >by Andrew S. Tanenbaum. Anyone have a version of DES with a 128 bit key size? Or
- >alternative choices for S-boxes? Or just maybe the NSA doesn't want you to crypt
- >something that the gov't can't uncrypt.
- Uh, read your first line. You have the source- change the Sboxes to your
- heart's content. Double, triple, qudruple encrypt with different keys,
- and different permutations. If NSA had really wanted to make sure you
- couldn't use anything but their weak(???) DES, they would never have
- agreed to release the details of DES for you to change them.
-