Cryptography-Digest Digest #440, Volume #11      Wed, 29 Mar 00 01:13:01 EST

Contents:
  prime number solution ([EMAIL PROTECTED])
  prime number solution ([EMAIL PROTECTED])
  prime number solution ([EMAIL PROTECTED])
  Re: DES question (David Hopwood)
  prime solution ([EMAIL PROTECTED])
  Re: prime solution (Rob Johnson)
  Re: Schoof's Algorithm (DJohn37050)
  Re: prime solution (DJohn37050)
  Re: prime solution ("Dann Corbit")
  Re: Is it really NSA ?! ([EMAIL PROTECTED])
  Re: prime solution (David G Radcliffe)
  number 32 in a series (wtshaw)
  Re: ecc equation (David A Molnar)
  RESULT: sci.crypt.random-numbers passes 134:12 (Dave Cornejo)

----------------------------------------------------------------------------

From: [EMAIL PROTECTED]
Subject: prime number solution
Date: Wed, 29 Mar 2000 03:06:16 GMT

I offer the following solution to prime numbers.
This solution, as trivial as it is, has been
hidden from us until now.   I hope people
appreciate what it takes to keep this hidden for
so long.

A(n)=6*n-1
B(n)=6*n+1
for all n=1,2,3...

A and B define the "possible prime space."  Let's
go through some examples.

5 7
11 13
17 19
23 (25) (25=5*5)
29 31
(35) 37  (35=5*7)
41 43
47 (49) (49=7*7)
etc.


So everything is prime unless it is the
combination of two other things in this set.

Another interesting thing:

A()*A()=B()
B()*B()=B()
A()*B()=A()

So any p^2-1 is divisible by 6.

I won't give away the ending just yet, but you can
use this to find large primes or the prime factors
of huge numbers with relative ease.  Can you see
the solution?

This is like the "special theory of primality"
There is also a to-be-revealed "general theory of
primality" which describes how 1,2, and 3 create
our entire number system (1 _is_ prime).  Read Tao
Te Ching ch. 42 and Isiah 42 for more hints.

Baruch Hashem,

Joseph Ben-Adam Ben-Emet


Sent via Deja.com http://www.deja.com/
Before you buy.

------------------------------

From: [EMAIL PROTECTED]
Subject: prime number solution
Date: Wed, 29 Mar 2000 03:06:20 GMT

I offer the following solution to prime numbers.
This solution, as trivial as it is, has been
hidden from us until now.   I hope people
appreciate what it takes to keep this hidden for
so long.

A(n)=6*n-1
B(n)=6*n+1
for all n=1,2,3...

A and B define the "possible prime space."  Let's
go through some examples.

5 7
11 13
17 19
23 (25) (25=5*5)
29 31
(35) 37  (35=5*7)
41 43
47 (49) (49=7*7)
etc.


So everything is prime unless it is the
combination of two other things in this set.

Another interesting thing:

A()*A()=B()
B()*B()=B()
A()*B()=A()

So any p^2-1 is divisible by 6.

I won't give away the ending just yet, but you can
use this to find large primes or the prime factors
of huge numbers with relative ease.  Can you see
the solution?

This is like the "special theory of primality"
There is also a to-be-revealed "general theory of
primality" which describes how 1,2, and 3 create
our entire number system (1 _is_ prime).  Read Tao
Te Ching ch. 42 and Isiah 42 for more hints.

Baruch Hashem,

Joseph Ben-Adam Ben-Emet


Sent via Deja.com http://www.deja.com/
Before you buy.

------------------------------

From: [EMAIL PROTECTED]
Subject: prime number solution
Date: Wed, 29 Mar 2000 03:06:17 GMT

I offer the following solution to prime numbers.
This solution, as trivial as it is, has been
hidden from us until now.   I hope people
appreciate what it takes to keep this hidden for
so long.

A(n)=6*n-1
B(n)=6*n+1
for all n=1,2,3...

A and B define the "possible prime space."  Let's
go through some examples.

5 7
11 13
17 19
23 (25) (25=5*5)
29 31
(35) 37  (35=5*7)
41 43
47 (49) (49=7*7)
etc.


So everything is prime unless it is the
combination of two other things in this set.

Another interesting thing:

A()*A()=B()
B()*B()=B()
A()*B()=A()

So any p^2-1 is divisible by 6.

I won't give away the ending just yet, but you can
use this to find large primes or the prime factors
of huge numbers with relative ease.  Can you see
the solution?

This is like the "special theory of primality"
There is also a to-be-revealed "general theory of
primality" which describes how 1,2, and 3 create
our entire number system (1 _is_ prime).  Read Tao
Te Ching ch. 42 and Isiah 42 for more hints.

Baruch Hashem,

Joseph Ben-Adam Ben-Emet


Sent via Deja.com http://www.deja.com/
Before you buy.

------------------------------

Date: Tue, 28 Mar 2000 21:26:09 +0100
From: David Hopwood <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
Subject: Re: DES question

=====BEGIN PGP SIGNED MESSAGE=====

Scott Fluhrer wrote:
> David Hopwood <[EMAIL PROTECTED]> wrote in message
> news:[EMAIL PROTECTED]...
> > -----BEGIN PGP SIGNED MESSAGE-----
> >
> > Paul Rubin wrote:
> > > In article <[EMAIL PROTECTED]>, doc
> > > <[EMAIL PROTECTED]> wrote:
> > [...]
> > > >Perhaps a more general way of asking this question is to
> > > >inquire about the domain of the ciphertext.
> > > >
> > > >Or, is it possible to have a ciphertext that does NOT
> > > >decrypt using DES?
> > >
> > > That wouldn't make any sense.  It would mean the encryption was not
> > > reversible.
> >
> > It is possible to have a reversible encryption algorithm with this
> > property, but it would have to be probabilistic, and the ciphertext
> > would have to be longer than the plaintext (a concrete example is
> > DHAES).

> Actually, there's no reason it would have to be probabilistic.

You're right, I stand corrected.

- -- 
David Hopwood <[EMAIL PROTECTED]>
PGP public key: http://www.users.zetnet.co.uk/hopwood/public.asc
RSA 2048-bit; fingerprint 71 8E A6 23 0E D3 4C E5  0F 69 8C D4 FA 66 15 01


=====BEGIN PGP SIGNATURE=====
Version: 2.6.3i
Charset: noconv

iQEVAwUBOOEjYDkCAxeYt5gVAQE+Ygf+JHcBIDELI1L03wrMOI3tuCKQRVETFNMv
fHi4DQ2L1vjhoRJXUPuZA/dC+chPvrrgJt5xkIcgllYOfWhjVYp+C5R1jR33uvJL
UMy/nQTqU9fis3CKaW933vJfEGIOggk/nvDFoJIfv1/nwjjR8vSGLcdEi+ziHsI7
+Vy/p2HpVhGANQkeaosB8b07Ga2O+QXhZMKexSVIQkyOjIEbIwZn4OF+KXlp2Mff
M7g68DTLrMR5LOD5YJh/loY+PpMqCo22uPVyUlJA/8QG4N6fUeySQWGUG+WlWOKr
HXPmc6FWi4MDKH3BOrD9cM+AWK6HiQK36YlzjwLJ320MC3rLsGM8Zw==
=V7NP
=====END PGP SIGNATURE=====


------------------------------

From: [EMAIL PROTECTED]
Crossposted-To: sci.math
Subject: prime solution
Date: Tue, 28 Mar 2000 20:47:42 -0700

I offer the following solution to prime numbers.
This solution, as trivial as it is, has been
hidden from us until now.   I hope people
appreciate what it takes to keep this hidden for
so long.

A(n)=6*n-1
B(n)=6*n+1
for all n=1,2,3...

A and B define the "possible prime space."  Let's
go through some examples.

A B
5 7
11 13
17 19
23 (25) (25=5*5)
29 31
(35) 37  (35=5*7)
41 43
47 (49) (49=7*7)
etc.


So everything is prime unless it is the
combination of two other things in this set.

Another interesting thing:

A()*A()=B()
B()*B()=B()
A()*B()=A()

So any p^2-1 is divisible by 6.

I won't give away the ending just yet, but you can
use this to find large primes or the prime factors
of huge numbers with relative ease.  Can you see
the solution?

This is like the "special theory of primality"
There is also a to-be-revealed "general theory of
primality" which describes how 1,2, and 3 create
our entire number system (1 _is_ prime).  Read Tao
Te Ching ch. 42 and Isiah 42 for more hints.

Baruch Hashem,

Joseph Ben-Adam Ben-Emet


------------------------------

From: [EMAIL PROTECTED] (Rob Johnson)
Crossposted-To: sci.math
Subject: Re: prime solution
Date: 29 Mar 2000 03:50:53 GMT
Reply-To: [EMAIL PROTECTED] (Rob Johnson)

In article <[EMAIL PROTECTED]>,
[EMAIL PROTECTED] wrote:
>I offer the following solution to prime numbers.
>This solution, as trivial as it is, has been
>hidden from us until now.   I hope people
>appreciate what it takes to keep this hidden for
>so long.
>
>A(n)=6*n-1
>B(n)=6*n+1
>for all n=1,2,3...
>
>A and B define the "possible prime space."  Let's
>go through some examples.
[snip]

This is fairly basic number theory.  If p is a prime other than 2 or 3,
then p must be relatively prime to 6.  There are only two equivalence
classes modulo 6 that are relatively prime to 6, +1 and -1.  So any
prime number other than 2 or 3 is going to be of the form 6n+1 or 6n-1.

>So any p^2-1 is divisible by 6.

This fails for p = 2 and p = 3.  Otherwise, p is +1 or -1 mod 6, so
p^2 is going to be 1 mod 6, and p^2-1 is going to be 0 mod 6, which
means that 6 divides p^2-1.

Rob Johnson
[EMAIL PROTECTED]

------------------------------

From: [EMAIL PROTECTED] (DJohn37050)
Subject: Re: Schoof's Algorithm
Date: 29 Mar 2000 03:55:30 GMT

This is impressive and I am impressed.
Don Johnson

------------------------------

From: [EMAIL PROTECTED] (DJohn37050)
Subject: Re: prime solution
Date: 29 Mar 2000 03:56:40 GMT

All primes bigger than 3 cannot have 2 or 3 as factors?
Don Johnson

------------------------------

From: "Dann Corbit" <[EMAIL PROTECTED]>
Crossposted-To: sci.math
Subject: Re: prime solution
Date: Tue, 28 Mar 2000 20:01:10 -0800

Why stop with 3 & 2?  Go on with factors 5, 7, 11 and at least you'll get
decent compression for your sieve.

By the way, your formula is completely useless for factoring large primes.
--
C-FAQ: http://www.eskimo.com/~scs/C-faq/top.html
 "The C-FAQ Book" ISBN 0-201-84519-9
C.A.P. Newsgroup   http://www.dejanews.com/~c_a_p
C.A.P. FAQ: ftp://38.168.214.175/pub/Chess%20Analysis%20Project%20FAQ.htm



------------------------------

From: [EMAIL PROTECTED]
Subject: Re: Is it really NSA ?!
Date: Wed, 29 Mar 2000 03:58:10 GMT

In article <
aha2es86dduequv9kmmrarhvc2m87b5rsk@4ax.
com>,
[EMAIL PROTECTED] wrote:

> Unless NSA is using C&W as a "cut-out" I suspect that this is
> someone's (pretty good) idea of humor.
>

     Earlier I saw that some Brits (including
hackers) are annoyed with C & W. Reminded of
this, I suggest to Disastry that you might
consider asking the hacker community if they
have heard of "Spookweb" (some of them who
have hacked government systems may have
seen this term). I myself have fantasized
about hacking the NSA but wouldn't actually
attempt it because it's too risky-  I don't want
to end up " a breaking rocks in the hot sun
because I fought the law and the law won" *or
worse*-  I'm an adult male and adult prison
ain't my bag, baby. Besides, Big Brother (or his
underlings) can view what I'm doing from this
pc.


Sent via Deja.com http://www.deja.com/
Before you buy.

------------------------------

From: David G Radcliffe <[EMAIL PROTECTED]>
Crossposted-To: sci.math
Subject: Re: prime solution
Date: 29 Mar 2000 04:16:55 GMT

In sci.math [EMAIL PROTECTED] wrote:

: Another interesting thing:

: A()*A()=B()
: B()*B()=B()
: A()*B()=A()

: So any p^2-1 is divisible by 6.

Surely you can do better than that. If p is a prime number 
greater than 3, then p^2-1 is divisible by 24.

: I won't give away the ending just yet, but you can
: use this to find large primes or the prime factors
: of huge numbers with relative ease.  Can you see
: the solution?

No, I cannot. Would you care to demonstrate your method by factoring
23191853949132775016046280012050082371924489779 ?
 
-- 
David Radcliffe                         [EMAIL PROTECTED]


------------------------------

From: [EMAIL PROTECTED] (wtshaw)
Subject: number 32 in a series
Date: Tue, 28 Mar 2000 21:32:29 -0600

My recent algorithm, Pinsk, converted base 26 to base 52, even converted
output to card values...a la 52 pickup.

The current addition is Maas, which converts base 51 to 52.  Keys and much
of the math are inherited from Pinsk. Even the 26 letter substitution key
is the same, so with Maas, you don't get really mas, but less than you
expect, since it would be possible to have the alphabet-26  key screwed up
and still get all the formatting right.  You might think of this as
similiar to substituting letters, but still relying on other unchanged
ascii values, or absence of them, which can give a cracker lots of help.

To get a 51-character plaintext set, work with 46 of the 47 usual keyboard
keys, use a separate character "|" to shift to upper or to lower case "\"
for them, which makes the subtotal 48. Use the other 3 for random space
characters, taken one at a time for a space, two for a carriage return,
and three for a blank line.

For ciphertext, the 52-characters, a to z, A to Z, are a Pinsk, and the
card representing scheme is the same. The tightness of Maas is better than
that of Pinsk, which was marginal.

I hope it will be simple to go to the next algorithm, which is to be much
the same as Mass, more space options, and a pair of jokers in the output
set.  Then, I see only one more that also uses a 54 card deck and base
translation, but it would be a shame to let all this nifty card handling
stuff end there, so I probably won't.
-- 
Given all other distractions, I'd rather be programming.

------------------------------

From: David A Molnar <[EMAIL PROTECTED]>
Subject: Re: ecc equation
Date: 29 Mar 2000 04:30:22 GMT

Paul Rubin <[EMAIL PROTECTED]> wrote:
> I have this book and agree with Bob that it is great.   However,
> it is quite advanced.  I have a math degree (undergrad) and can't
> understand much of it.  It is definitely a graduate level math text.

seconded. I have it as a reference (especially for lattice basis
reduction), but large parts of it are completely 
inaccessible to me. This is changing a little bit this term, since
I'm auditing a course covering some algebraic number theory...

> Much more accessible is: A Course in Number Theory and Cryptography,
> by Neal Koblitz.  I can understand most of that one.

I like this book a great deal. My only "complaint" is that it doesn't 
cover such things as how to actually use the primitives it describes 
in order to create a secure cryptosystem. no definitions of security, 
no OAEP, that kind of thing. I wouldn't try to implement a real
cryptosystem using only this book (that's what HAC is for).

On the other hand, its introduction to factoring algorithms is
wonderful, and maybe worth the price alone.

Thanks, 
-David

------------------------------

From: Dave Cornejo <[EMAIL PROTECTED]>
Crossposted-To: news.announce.newgroups,news.groups,sci.electronics.misc,sci.physics
Subject: RESULT: sci.crypt.random-numbers passes 134:12
Date: Wed, 29 Mar 2000 05:16:30 GMT

                                RESULT
       unmoderated group sci.crypt.random-numbers passes 134:12

There were 134 YES votes and 12 NO votes, for a total of 146 valid
votes.  There were 2 abstentions.

For a group to pass, YES votes must be at least 2/3 of all valid
(YES and NO) votes.  There must also be at least 100 more YES votes
than NO votes.

A five day discussion period follows this announcement.  If no
serious allegations of voting irregularities are raised, the
moderator of news.announce.newgroups will create the group shortly
thereafter.

Newsgroups line:
sci.crypt.random-numbers        Generating cryptographic strength randomness.

Voting closed at 23:59:59 UTC, 28 Mar 2000.

This vote was conducted by a neutral third party.  Questions
about the proposed group should be directed to the proponent.

Proponent: Scott Nelson <[EMAIL PROTECTED]>
Votetaker: Dave Cornejo <[EMAIL PROTECTED]>

RATIONALE: sci.crypt.random-numbers

Over the years, there's been a lot of traffic on this topic in
sci.crypt, and it makes sense to split it off into it's own
sub-group, both to relieve the pressure on sci.crypt,
and so more people who are interested in just the randomness
part and not the cryptography part of the topic can find it.

It was once believed that there would be support for a broader
version of this group, which could handle traffic for all aspects
of randomness, not just cryptographic strength randomness.
At this time however, there seems to be insufficient consensus on
where in the hierarchy such a group should go.

CHARTER: sci.crypt.random-numbers

Sci.crypt.random-numbers is for the discussion of cryptographic
strength random number generators, both "true" (hardware) and
"pseudo" (software), and anything else related to the science
of cryptographic strength randomness.  Fit topics include but
are not limited to;
 * New designs for and questions about hardware and software
   random number generators.
 * Questions about the nature of randomness and the definition of
   randomness.

This is NOT a place to post lists of random-numbers.

END CHARTER.


sci.crypt.random-numbers Final Voter list

Voted YES
===============================================================================
lipo#bofh.at                                                 Roland E. Lipovits
Elisabeth.Oswald#iaik.at                                       Elisabeth Oswald
matthew#astracon.com.au                                      Matthew Henricksen
rstrand#ihug.com.au                                               Robert Strand
toivo#ucs.uwa.edu.au                                              Toivo Pedaste
aq697#chebucto.ns.ca                                       George Thomas Weldon
trevort#vianet.on.ca                                             Trevor Tymchuk
het#pangea.ca                                                     Harvey Taylor
macpherson-a#rmc.ca                                             Alex MacPherson
CraigWyllie#sympatico.ca                                           Craig Wyllie
daniel.b.belanger#ca.abb.com
thogard#abnormal.com                                                 Tim Hogard
dseal#arm.com                                                        David Seal
shalunov#att.com                                             stanislav shalunov
hermit#BayView.COM                                              William R. Ward
kimdv#best.com                                                     Kim DeVaughn
roses#cape.com                                           Dolores Scaldini-Klimm
72027.3605#compuserve.com
edwards#crl.com                                                 Gregory Edwards
WmHBlair#dnai.com                                              William H. Blair
jfn#enteract.com                                                    J.F. Nelson
julesd#erols.com                                                   Jules Dubois
mcclenon#erols.com                                                 Bob McClenon
biow#ezmort.com                                                Christopher Biow
smlucas#famvid.com                                                 Steven Lucas
mattj#flashmail.com                                                        Matt
gregor#focusresearch.com                                        Gregor N. Purdy
john.feth#honeywell.com                                       Feth, John (AZ75)
nictamer#hotmail.com                                                 Nick Tamer
dietz#interaccess.com                                             Paul F. Dietz
nlauerman#interaccess.com                                     Nicholas Lauerman
carlson#ironbridgenetworks.com                                    James Carlson
chris#kzim.com                                      Christopher Robin Zimmerman
Leemon#Leemon.com                                                  Leemon Baird
Kurt.InAlbon#lonzagroup.com                                       Kurt In Albon
ashwood#msn.com                                                  Joseph Ashwood
tina#starbase.neosoft.com                                            Tina Marie
ime#netcom.com                                                     Randy Hudson
sleepy#os.com                                                 Alexander Pennace
dc#panix.com                                                  David W. Crawford
squid#panix.com                                                        Yeoh Yiu
buff#pobox.com                                                   William Denton
jepace#pobox.com                                                     James Pace
mra#pobox.com                                                       Mark Atwood
nartsegg#pobox.com                                             Jonathan Roberts
ggr#qualcomm.com                                                 Gregory G Rose
mcoleman2#kc.rr.com                                                Mike Coleman
derouet#montrouge.tt.slb.com                                      Odile Derouet
pautot#montrouge.tt.slb.com                                      Fabrice PAUTOT
jcoffin#taeus.com                                                  Jerry Coffin
Dennis.Keats#ti.com    </FONT><FONT SIZE=2 FACE="Arial"> Dennis R. Keats</FONT>
davidsen#tmr.com                                                  Bill Davidsen
ed#twin-cities.com                                                   ed bertsch
thomas.zz-williams#ubs.com                                      Thomas Williams
hustvedt#ma.ultranet.com                                          Eric Hustvedt
xanthian#well.com                                               Kent Paul Dolan
rascproponents#yahoo.com                                       Brian P. Sweeney
Ekkehard.Uthke#gmx.de                                            Ekkehard Uthke
nhoffm#in-kiel.de                                              Norbert Hoffmann
list-votes#dream.kn-bremen.de                                  Martin Schr"oder
mok-kong.shen#t-online.de                                         Mok-Kong Shen
hsauer#marnie.teuto.de                                            Henning Sauer
juettner#trustcenter.de                                     Hans-Ulrich J�ttner
perle#cs.tu-berlin.de                                               Frank Wilde
pom#imsd.uni-mainz.de                                         Klaus Pommerening
lucks#weisskugel.informatik.uni-mannheim.de                        Stefan Lucks
bouvin#daimi.au.dk                                            Niels Olof Bouvin
mors#daimi.au.dk                                               mors#daimi.au.dk
kasper#bitnisse.dk                                        Kasper Kjeld Pedersen
pink#diku.dk                                                Christian Boesgaard
peteralf#mailme.dk                                              Peter Alfredsen
rajwi#bu.edu                                                    Rajwinder Singh
mph#astro.caltech.edu                                              Matthew Hunt
jac#mailer.scri.fsu.edu                                                Jim Carr
willner#cfa.harvard.edu                                           Steve Willner
dmolnar#fas.harvard.edu                                            David Molnar
jeffreyh#hawaii.edu                                              Jeffrey Herman
rra#stanford.edu                                                   Russ Allbery
jones#cs.uiowa.edu                                             Douglas W. Jones
carrx019#tc.umn.edu                                                       p1p3r
bruno#cerberus.csd.uwm.edu
rufinus#mbe.ece.wisc.edu                                              J Rufinus
rosing#physiology.wisc.edu                                          Mike Rosing
christof#ece.wpi.edu                                              Christof Paar
barranquero#laley.wke.es                                     Juanma Barranquero
vesak#cutery.fi                                                Vesa Karjalainen
kristian.liimatainen#helsinki.fi                              Lauri Liimatainen
ttw#lanl.gov                                                    Tony T. Warnock
jmyre#sandia.gov                                                    John W Myre
mau#beatles.cselt.it                                           Maurizio Codogno
nospam.newton#gmx.li                                              Philip Newton
4basil#worldnet.att.net                                            basil sadler
dsmolen#bellatlantic.net                                          Donald Smolen
ellis#ftel.net                                                       Rick Ellis
jmh#gmx.net                                                            Jan Haar
starhan#gmx.net                                            Franz -STAR- Starhan
ltb#haruspex.net                                                     Len Blanks
cmcurtin#interhack.net                                              Matt Curtin
tc#mcs.net                                                          Thomas Cuny
samstee#netnet.net                                                Robert Steele
shrao#nyx.net                                                       Shrisha Rao
mmontcha#OregonVOS.net                                       Matthew Montchalin
wakelyn#pinn.net                                                  N. T. Wakelyn
evert#royal.net                                                Evert Meulie esq
fogazzid#softhome.net                                           Daniele Fogazzi
theamk#softhome.net                                                   Mikhail A
gavan#spamcop.net                                               Gavan Schneider
cind0revs#toadmail.toad.net                                          Art Mongan
SteveMacGregor#USA.Net                                          Steve MacGregor
Peter-Lawrence.Montgomery#cwi.nl                            Peter L. Montgomery
erik#flits102-126.flits.rug.nl                                   Erik Warmelink
scarblac-rt#pino.selwerd.nl                                       Remco Gerlich
agregorio#acm.org                                           Alfonso De Gregorio
John_David_Galt#acm.org                                         John David Galt
kb5cng#amsat.org                                                 R. L. Thompson
darkskyz#cyberspace.org                                           Tomer Brisker
tom#dasoft.org                                                     Tom St Denis
zed#debian.org                                                        Zed Pobre
scott#helsbreth.org                          Scott Nelson <scott#helsbreth.org>
larry#smith-house.org                                               Larry Smith
dave#technopagan.org                                             David E. Smith
szymon#uci.agh.edu.pl                                              Szymon Sokol
Michael.Salmon#uab.ericsson.se                                   Michael Salmon
bo.doemstedt#mbox200.swipnet.se                                     Bo D�mstedt
tim#bits.bris.ac.uk                                                   Tim Tyler
alex.dawson#uea.ac.uk                                               Alex Dawson
jgd#cix.co.uk                                                      John Dallman
klockstone#cix.compulink.co.uk                                  Keith Lockstone
wrd#glaurung.demon.co.uk                                           Will Dickson
timpart#perdix.demon.co.uk                                    Timothy Partridge
keith#quetz.demon.co.uk                                        Keith Brazington
screech#krash.f9.co.uk                                                  Screech
james#sfgiants22.freeserve.co.uk                                   James Farrar

Voted NO
===============================================================================
Norbert.Pfannerer#sail-labs.at                                Norbert Pfannerer
mskala#ansuz.sooke.bc.ca                                          Matthew Skala
stainles#bga.com                                                   Dwight Brown
mwooding#ncipher.com                                               Mark Wooding
jaygee#primenet.com                                                   Jim Geary
naddy#mips.rhein-neckar.de                                 Christian Weisgerber
rick#bcm.tmc.edu                                              Richard H. Miller
gwyn#arl.mil                                              Douglas A. Gwyn (IST)
fwbrown#bellsouth.net                                               Wayne Brown
hal#finney.org                                                       Hal Finney
h.nareid#nareid.demon.co.uk                                        Helge Nareid
chriseb#ukshells.co.uk                                           Chris Ebenezer

Abstained
===============================================================================
r.vanette#pink.nl                                           Robert-Jan van Ette
merlin#netlink.co.uk                                            Darren Wyn Rees

Invalid ballots
===============================================================================
No invalid votes

To restore the email addresses above, pipe the ack list through the
following command:

    sed -e 's/#/@/g'

-- 
Voting question & problems: Dave Cornejo <[EMAIL PROTECTED]>
Voting address: [EMAIL PROTECTED]

------------------------------


** FOR YOUR REFERENCE **

The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:

    Internet: [EMAIL PROTECTED]

You can send mail to the entire list (and sci.crypt) via:

    Internet: [EMAIL PROTECTED]

End of Cryptography-Digest Digest
******************************

Reply via email to