On Thu, 25 Apr 2002, Rod Roark wrote: > Interesting, I never thought about that before. The "locking" > (and corresponding unlocking) could easily be done by xor'ing > against some string of pseudo-random characters that only > the encryptor knows how to produce.
The most advanced encryption available is found when you use 2XOR (double-XOR) with your data and the same key. You also get a huge cost savings in performance, as some stes can be skipped and, 8 bit 2XOR is just as secure as 2048bit 2XOR (assuming the same key in both passes. (Tongue in cheek - biteing down hard.) (This would have been better posted April, 1,2002 ;-) -ME -----BEGIN GEEK CODE BLOCK----- Version: 3.12 GCS/CM$/IT$/LS$/S/O$ !d--(++) !s !a+++(-----) C++$(++++) U++++$(+$) P+$>+++ L+++$(++) E W+++$(+) N+ o K w+$>++>+++ O-@ M+$ V-$>- !PS !PE Y+ !PGP t@-(++) 5+@ X@ R- tv- b++ DI+++ D+ G--@ e+>++>++++ h(++)>+ r*>? z? ------END GEEK CODE BLOCK------ decode: http://www.ebb.org/ungeek/ about: http://www.geekcode.com/geek.html _______________________________________________ vox-tech mailing list [EMAIL PROTECTED] http://lists.lugod.org/mailman/listinfo/vox-tech
