Tech Insider					     Technology and Trends


			      USENET Archives

Path: gmdzi!unido!ira.uka.de!fauern!lan!liebla
From: lie...@lan.informatik.tu-muenchen.dbp.de (Armin Liebl)
Newsgroups: sci.crypt
Subject: Successors of DES
Message-ID: <4691@tuminfo1.lan.informatik.tu-muenchen.dbp.de>
Date: 2 Oct 90 12:41:10 GMT
Sender: ne...@lan.informatik.tu-muenchen.dbp.de
Reply-To: lie...@lan.informatik.tu-muenchen.dbp.de (Armin Liebl)
Organization: Inst. fuer Informatik, TU Muenchen, W. Germany
Lines: 9
Posted: Tue Oct  2 13:41:10 1990

Does anybody know of the encryption algorithms that
the NSA is using instead of DES.
Help would be appreciated.

--
Armin Liebl
Technische Universitaet Muenchen
Institut fuer Informatik
Postfach 202420

Path: gmdzi!unido!mcsun!uunet!ogicse!ucsd!ucbvax!hoptoad!gnu
From: gnu@hoptoad.uucp (John Gilmore)
Newsgroups: sci.crypt
Subject: Re: Successors of DES
Message-ID: <12789@hoptoad.uucp>
Date: 10 Oct 90 16:30:18 GMT
References: <4691@tuminfo1.lan.informatik.tu-muenchen.dbp.de> 
<14016@smoke.BRL.MIL>
Organization: Cygnus Support, Palo Alto
Lines: 31
Posted: Wed Oct 10 17:30:18 1990

lie...@lan.informatik.tu-muenchen.dbp.de (Armin Liebl) writes:
> Does anybody know of the encryption algorithms that
> the NSA is using instead of DES.  Help would be appreciated.

gw...@smoke.BRL.MIL (Doug Gwyn) wrote:
> Surely you must know that such information would be classified,
> and anyone with access to it who disclosed it would be subject to
> severe penalties.

I'd have expected more rational responses from the old-timers on sci.crypt.
I mean, he didn't ask for the keys they're using this week!

I had this impression that in modern cryptography, it was *assumed* that
the adversary knew full details of the algorithm involved, and the only
secret knowledge was the key and key schedule.

Now, NSA has been playing cat-and-mouse recently by not revealing
algorithms, and putting things in "tamper proof" chips, but it is not a
"Surely you must know..." that they haven't publicly revealed ANY
algorithms since DES.  Any serious adversary will have either compromised
the "tamper proof" chips (what man can invent, another can dissect),
or have stolen or bought their plans.  What NSA is doing with this strategy
is keeping THEIR OWN CITIZENS in the dark, because they don't see protecting
their citizens' privacy as part of their job; they're not fooling the KGB.

A more useful question would be, now that NIST has been given full authority
for civilian cryptography, does anybody know of the encryption algorithms
that NIST is using instead of DES.  Help would be appreciated.
-- 
John Gilmore      {sun,pacbell,uunet,pyramid}!hoptoad!gnu        g...@toad.com
Just say no to thugs.  The ones who lock up innocent drug users come to mind.

			        About USENET

USENET (Users’ Network) was a bulletin board shared among many computer
systems around the world. USENET was a logical network, sitting on top
of several physical networks, among them UUCP, BLICN, BERKNET, X.25, and
the ARPANET. Sites on USENET included many universities, private companies
and research organizations. See USENET Archives.

		       SCO Files Lawsuit Against IBM

March 7, 2003 - The SCO Group filed legal action against IBM in the State 
Court of Utah for trade secrets misappropriation, tortious interference, 
unfair competition and breach of contract. The complaint alleges that IBM 
made concentrated efforts to improperly destroy the economic value of 
UNIX, particularly UNIX on Intel, to benefit IBM's Linux services 
business. See SCO vs IBM.

The materials and information included in this website may only be used
for purposes such as criticism, review, private study, scholarship, or
research.

Electronic mail:			       WorldWideWeb:
   tech-insider@outlook.com			  http://tech-insider.org/