[prev in list] [next in list] [prev in thread] [next in thread] 

List:       cypherpunks
Subject:    Re: Australian "Walsh" report exposes the hole in key escrow
From:       lcs Mixmaster Remailer <mix () anon ! lcs ! mit ! edu>
Date:       1997-06-30 15:40:00
[Download RAW message or body]


John Davidson wrote:
> The US National Institute of Standards and Technology recently made a 
> worldwide plea for cryptography algorithms that can be used for 
> authentication and not for encryption. 
     
  And, of course, cannot be used to authenticate encryption keys. Oh, but
they're just binary data, aren't they? So those Evil Terrorists(tm) will
simply use their magic authentication-only keys to authenticate their
secret un-surrendered encryption keys and they're off.

SignatureMonger

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic