home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!sun-barr!olivea!charnel!rat!zeus!
- From: mrothste@keiko.acs.calpoly.edu (Rothstein)
- Newsgroups: comp.sys.next.misc
- Subject: Re: UNIX Mail with PubKey Encryption
- Message-ID: <1992Nov19.011926.153740@zeus.calpoly.edu>
- Date: 19 Nov 92 01:19:26 GMT
- References: <1e64k7INNsqv@agate.berkeley.edu>
- Sender: news@zeus.calpoly.edu
- Reply-To: mrothste@data.acs.calpoly.edu
- Organization: Cal Poly State University, San Luis Obispo
- Lines: 33
-
- > Of course, the real way to do solid encription is the following.
- > First, make up some gizmo to generate a random binary string, (White
- noise,
- > maby. Hmm, I wonder how random blowing into the mike is?) You CAN"T
- use
- > the random number function, it must be TREULY random. THen, make a
- single
- > copy and give it to your friend through a secure channel. You then use
- the
- > Voyench (sp) algorythem for one time encription. Very useful,
- completely
- > uncrackable. See Scientific American Oct 92 for a sidebar on the
- subject.
- > Possibly make a service to take a key and file and encrypt, and another
- to
- > decrypt. Voila, now you can REALLY give the NSA fits.
- > --
- > Nicholas C. Weaver
- > nweaver@soda.berkeley.edu
- > It is a tale, told by an idiot, full of sound and fury, .signifying
- nothing.
- > Tis better to dream with eyes wide open.
-
- It is at times like these that the hacker in me wants to break into NSA
- files, use FEE on everything. Then tell them that if they want to read it
- they are going to have to buy the software. (i.e. let you publish it)
-
- --
- -Mont
-
- NeXTmail OK :-)
- President CP-NUG (Cal Poly NeXT User Group)
- mrothste@data.acs.calpoly.edu
-