--
William Rowden writes:
 > > In the tempting-but-wrong category, one could include samples of
 > > the insecure systems that result when programmers with no
 > > cryptanalysis background create their own cryptographic
 > > algorithms.

At 07:20 PM 8/11/2000 +0000, lcs Mixmaster Remailer wrote:
 > Yes, and let us hope that Michael Paul Johnson resists the
 > temptation to plug his own home-grown ciphers, Sapphire and Diamond.

These cyphers should appear in the book, but with a comment as to what 
extent they have been subject to attack, and have withstood attack.  If 
they have not been subject to much attack, people should not use them, but 
should read them.

     --digsig
          James A. Donald
      6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
      jWnprzbdcockuFt7jlrh6D57vGi84SX9Qz8lhH+j
      4f1X5tAzhVXqKLOeFps1Q4DXRbKUyYfziiL68LAce


Reply via email to