On Thu, Sep 27, 2001 at 02:48:11PM -0700, Patrick Oscar Boykin wrote: > If you give me a hash, I can make a cipher (and vice-versa) so while a > hash looks innocent enough (just some function with pseudo-random > outputs) it can be used to make a cipher. > > See Applied Crypto for Luby-Rackoff. You know that and I know that, but what the state of law will likely be is that things are illegal if the NSA can't read them. So while a hash function can be turned into a crypto algorithm, one will not be in trouble until you actually do it.
Scott
msg02777/pgp00000.pgp
Description: PGP signature
