On 14 May 2001, at 11:26, David Akin wrote: > Hey gang -- > Anyone know anything about Non-Elephant Encryption Systems Inc. out of > Calgary? (http://www.e-cryption.com) > > They've come up with an encryption scheme that doesn't require stored > keys. Random, one-use only keys are generated on the fly out of the > unique electronic pulses in any network. (Or so they say). >From their "Technologies" page: "Present network communications are composed of a number of information transport layers. These layers each produce their own level of randomness. In order to measure this natural randomness NE2 utilizes the Information Theory. This theory has the ability to quantify the natural disorder of network communications to produce a truly random number on both communicating devices. " You're either symmetrically keyed or asymmetrically keyed, and both approaches require some kind of key transmission. Otherwise, how does the other end know how to decrypt? Oh, and this one: "NE2 technology will offer copyright protection for all digital media whether that relates to music, movies, text, images, or software. This security feature is possible by creating an individual fingerprint for any particular digital media, and encrypting the embedded digital information with this fingerprint. The simple process does not contain keys and therefore would not be susceptible to reverse engineering attacks." I think the recent SDMI hack challenge (which also did not contain "keys") would contradict this on its face. I dunno... sounds like a whole lotta snake oil to me. -- Roy M. Silvernail Proprietor, scytale.com [EMAIL PROTECTED]
