[146561] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Three kinds of hash: Two are still under ITAR.

daemon@ATHENA.MIT.EDU (Phillip Hallam-Baker)
Wed Sep 4 13:14:07 2013

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <1315588095-1378238657-cardhu_decombobulator_blackberry.rim.net-2135654951-@b14.c9.bise6.blackberry>
Date: Wed, 4 Sep 2013 07:32:35 -0400
From: Phillip Hallam-Baker <hallam@gmail.com>
To: radix42@gmail.com
Cc: Cryptography Mailing List <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

--===============4704724805142036424==
Content-Type: multipart/alternative; boundary=089e0160b99878524004e58d2942

--089e0160b99878524004e58d2942
Content-Type: text/plain; charset=ISO-8859-1

While doing some research on the history of hashing for a client I
discovered that it is described in the very first edition of the ACM
journal and the paper is a translation of a Russian paper.

One of the many problems with the ITAR mindset is the assumption that all
real ideas are invented inside the US by white men wearing white lab coats
and that the rest of the undeserving world is stealing them.

Anyone with any grasp of history recognizes that the industrial scale
industrial espionage practiced by China on the industrial powers is merely
DIY reparations for the 19th century and the first half of the 20th.

--089e0160b99878524004e58d2942
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">While doing some research on the history of hashing for a =
client I discovered that it is described in the very first edition of the A=
CM journal and the paper is a translation of a Russian paper.<div><br></div=
>
<div>One of the many problems with the ITAR mindset is the assumption that =
all real ideas are invented inside the US by white men wearing white lab co=
ats and that the rest of the undeserving world is stealing them.=A0</div>
<div><br></div><div>Anyone with any grasp of history recognizes that the in=
dustrial scale industrial espionage practiced by China on the industrial po=
wers is merely DIY reparations for the 19th century and the first half of t=
he 20th.</div>
</div>

--089e0160b99878524004e58d2942--

--===============4704724805142036424==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============4704724805142036424==--

home help back first fref pref prev next nref lref last post