On 14 May 2001, at 11:26, David Akin wrote:

> Hey gang --
> Anyone know anything about Non-Elephant Encryption Systems Inc. out of
> Calgary? (http://www.e-cryption.com)
> 
> They've come up with an encryption scheme that doesn't require stored
> keys. Random, one-use only keys are generated on the fly out of the
> unique electronic pulses in any network. (Or so they say).

>From their "Technologies" page:

"Present network communications are composed of a number of 
information transport layers. These layers
each produce their own level of randomness. In order to measure 
this natural randomness NE2 utilizes the
Information Theory. This theory has the ability to quantify the 
natural disorder of network communications to
produce a truly random number on both communicating devices. "

You're either symmetrically keyed or asymmetrically keyed, and 
both approaches require some kind of key transmission.  
Otherwise, how does the other end know how to decrypt?

Oh, and this one:

"NE2 technology will offer copyright protection for all digital media 
whether that relates to music, movies, text,
images, or software. This security feature is possible by creating 
an individual fingerprint for any particular
digital media, and encrypting the embedded digital information with 
this fingerprint. The simple process does
not contain keys and therefore would not be susceptible to reverse 
engineering attacks."

I think the recent SDMI hack challenge (which also did not contain 
"keys") would contradict this on its face.

I dunno... sounds like a whole lotta snake oil to me. 
--
Roy M. Silvernail
Proprietor, scytale.com
[EMAIL PROTECTED]

Reply via email to