HP3000-L Archives

June 1998, Week 2

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Gavin Scott <[log in to unmask]>
Reply To:
Gavin Scott <[log in to unmask]>
Date:
Fri, 12 Jun 1998 14:17:09 -0700
Content-Type:
text/plain
Parts/Attachments:
text/plain (16 lines)
Wirt writes:
> For this kind of application, we can generate a encryption routine that
> will be essentially unbreakable, so long as we don't tell anyone what
> the algorithm is.

With all due respect, this is unlikely.  You can do something to
"obfuscate" the data stream so that it does not appear to be plain
text, but any "do it yourself" encryption algorithm is almost
always no better than a relatively simple obfuscation, no matter
how much clever code or mathematical churning you put in.  That is,
the cost to figure out a relatively simple obfuscation is probably
not much less than that to break a "high-powered" do-it-yourself
encryption algorithm.

G.

ATOM RSS1 RSS2