15647
来自「神经网络昆斯林的新闻组分类2006」· 代码 · 共 36 行
TXT
36 行
Newsgroups: sci.cryptPath: cantaloupe.srv.cs.cmu.edu!crabapple.srv.cs.cmu.edu!fs7.ece.cmu.edu!europa.eng.gtefsd.com!howland.reston.ans.net!noc.near.net!chpc.chpc.org!rboudrieFrom: rboudrie@chpc.org (Rob Boudrie)Subject: Re: How to detect use of an illegal cipher?Message-ID: <1993Apr21.171216.9342@chpc.org>Organization: Center For High Perf. Computing of WPI; Marlboro MaReferences: <1qn74nINNi38@golden.kaleida.com> <betel.734997645@camelot> <5wv5__m@rpi.edu>Date: Wed, 21 Apr 1993 17:12:16 GMTLines: 25>As for my impressions of the whole scheme It seems that instead of trying to>ban strong crypto, they are trying to co-opt it. Their contention that they >need to keep the algorythm secret to protect the security of the key>registration suggests possible inherent weakness to the algorythm. More likely>is that they dont want anyone constructing black market devices which dont >have the keys registered. Anyone else notice that in their Q&A session, theyPreventing black market chips w/non-escrowed keys IS exactly what theymean by protecting the security of the key escrow system. There aretwo parts to the security of such a system: (a) Preventing decruption by unauthorized personel (b) Assuring that the gummit can always decrypt clipper traffic when it authorizes itself to do so.Of course, the ministry of propoganda will do a lot of tallking about(a) and very little about (b). rob boudrie rboudrie@chpc.orgps: Anyone care to guess what encryption scheme the gov't is using on its newly formed database of anarch-cryptists who oppose this entire lunacy?
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?