On Thu, Sep 27, 2001 at 02:48:11PM -0700, Patrick Oscar Boykin wrote:
> If you give me a hash, I can make a cipher (and vice-versa) so while a
> hash looks innocent enough (just some function with pseudo-random
> outputs) it can be used to make a cipher.
> 
> See Applied Crypto for Luby-Rackoff.
You know that and I know that, but what the state of law will likely be is
that things are illegal if the NSA can't read them.  So while a hash
function can be turned into a crypto algorithm, one will not be in trouble
until you actually do it.

        Scott

Attachment: msg02777/pgp00000.pgp
Description: PGP signature

Reply via email to