home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cis.ohio-state.edu!zaphod.mps.ohio-state.edu!usc!news.service.uci.edu!ucivax!ofa123!Erik.Lindano
- From: Erik.Lindano@ofa123.fidonet.org
- Newsgroups: sci.crypt
- Subject: New Encryption - a Challenge
- X-Sender: newtout 0.02 Nov 17 1992
- Message-ID: <n0eeat@ofa123.fidonet.org>
- Date: 18 Nov 92 21:39:06
- Lines: 21
-
- Writes kocherp@leland.stanford.edu (Paul C. Kocher):
-
- > It sounds to me like this "encryption" system just involves
- > XORing random numbers onto the plaintext, which would explain
- > why the program is very short, cannot use keys, and produces
- > different cryptotext when run multiple times (different random
- > number seeds stored at the beginning of the cryptotext).
-
- The name seems familiar... the PKZIP password cracker?
- How... ah, interesting that you should make so many assumptions
- regarding an encryption method that you haven't even seen.
-
- Well, if it's that simple, it should be real easy to crack! Wanna
- try? (Actually, NuCrypt uses embedded, 2048-bit continuously-
- shifting keys. Not sure what that means, but you might know :-)
- Feel like taking a pot shot at it? Nah, you're probably too busy
- doing something else this time of year, right? Mating season
- perhaps..?
-
-
- --- Maximus 2.00
-