home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!stanford.edu!rutgers!ub!acsu.buffalo.edu!boyd
- From: boyd@acsu.buffalo.edu (Daniel F Boyd)
- Newsgroups: sci.crypt
- Subject: Re: New Encryption System - Challenge!
- Summary: You can binhex and _____ __.
- Message-ID: <BxDHCr.AMB@acsu.buffalo.edu>
- Date: 8 Nov 92 00:58:03 GMT
- References: <n0dc8t@ofa123.fidonet.org>
- Sender: nntp@acsu.buffalo.edu
- Organization: UB
- Lines: 31
- Nntp-Posting-Host: lictor.acsu.buffalo.edu
-
- In article <n0dc8t@ofa123.fidonet.org> Erik.Lindano@ofa123.fidonet.org writes:
- >
- > A person has approached me and said he has devised an unusual
- > encryption method.
- [...]
- > One of the challenges he's proposed goes like this:
- [...]
- > 2. Each of these encrypted files can be quickly and correctly
- > decrypted using the same or another copy of NuCrypt.
- [...]
- > 4. The NuCrypt program itself, used to perform the encryption and
- > decryption, is not disclosed.
- [...]
- > My acquaintance likes to think no one can defeat his cipher.
-
- Your acquaintance doesn't know ANYTHING about cryptography.
-
- He is ignorant of the Fundamental Assumption Of Cryptography:
-
- "The security of a system lies only in the keys."
-
- Given your description, NuCrypt doesn't even use a KEY.
-
- Send the guy to the library.
-
-
- --
- Daniel F. Boyd -- boyd@cs.buffalo.edu -a +X -x -e -m -S -F"> "
- ----------------------------------------------------------------------
- ((lambda (x) (list x (list (quote quote) x)))
- (quote (lambda (x) (list x (list (quote quote) x)))))
-