Article View: alt.privacy
Article #3449Re: NSA CAN BREAK PGP ENCRYPTION
From: bontchev@fbihh.i
Date: Fri, 03 Dec 1993 13:20
Date: Fri, 03 Dec 1993 13:20
29 lines
1176 bytes
1176 bytes
Scott Pallack (skybird@satelnet.org) writes: > This is trivial to test. Compile the program using an older compiler, > translate the program into fortran or something or hand-code it in > assembler. > Compare the outputs. > I'll bet they're the same. You'll lose, because they won't be. Even if you run one and the same copy of PGP twice, encrypting one and the same message, to one and the same person - the results will be different. This has already been discussed in alt.security.pgp. > BTW--ALWAYS assume that the NSA can decrypt anything you encrypt. Nonsense. There is a provably uncrackable cypher. The One-Time Pad. > Doesn't have a PGP key. Can't see much use for one, either. There are many. Read the docs. Just because you have nothing to hide does not mean that you have no reasons to use public key cryptography. Regards, Vesselin -- Vesselin Vladimirov Bontchev Virus Test Center, University of Hamburg Tel.:+49-40-54715-224, Fax: +49-40-54715-226 Fachbereich Informatik - AGN < PGP 2.3 public key available on request. > Vogt-Koelln-Strasse 30, rm. 107 C e-mail: bontchev@fbihh.informatik.uni-hamburg.de 22527 Hamburg, Germany
Message-ID:
<2dneeo$ofc@rzsun02.rrz.uni-hamburg.de>
Path:
rocksolid-us.pugleaf.net!archive.newsdeef.eu!mbox2nntp-alt.security.pgp.mbox.zip!gmd.de!newsserver.jvnc.net!howland.reston.ans.net!cs.utexas.edu!uunet!Germany.EU.net!netmbx.de!zib-berlin.de!news.rrz.uni-hamburg.de!fbihh.informatik.uni-hamburg.de!bontchev
References:
<064303Z02121993@anon.penet.fi> <1993Dec2.124258.28542@midway.uchicago.edu> <2dlmna$a7p@sefl.satelnet.org>