On Thu, Sep 27, 2001 at 02:48:11PM -0700, Patrick Oscar Boykin wrote:
> If you give me a hash, I can make a cipher (and vice-versa) so while a
> hash looks innocent enough (just some function with pseudo-random
> outputs) it can be used to make a cipher.
> 
> See Applied Crypto for Luby-Rackoff.
You know that and I know that, but what the state of law will likely be is
that things are illegal if the NSA can't read them.  So while a hash
function can be turned into a crypto algorithm, one will not be in trouble
until you actually do it.

        Scott

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20010927/aa8182ac/attachment.pgp>

Reply via email to