--
William Rowden writes:
> > In the tempting-but-wrong category, one could include samples of
> > the insecure systems that result when programmers with no
> > cryptanalysis background create their own cryptographic
> > algorithms.
At 07:20 PM 8/11/2000 +0000, lcs Mixmaster Remailer wrote:
> Yes, and let us hope that Michael Paul Johnson resists the
> temptation to plug his own home-grown ciphers, Sapphire and Diamond.
These cyphers should appear in the book, but with a comment as to what
extent they have been subject to attack, and have withstood attack. If
they have not been subject to much attack, people should not use them, but
should read them.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
jWnprzbdcockuFt7jlrh6D57vGi84SX9Qz8lhH+j
4f1X5tAzhVXqKLOeFps1Q4DXRbKUyYfziiL68LAce