[148529] in cryptography@c2.net mail archive
Re: [Cryptography] Chinese Cryptography
daemon@ATHENA.MIT.EDU (=?UTF-8?Q?Lodewijk_andr=C3=A9_de_l)
Thu Dec 19 14:32:21 2013
X-Original-To: cryptography@metzdowd.com
In-Reply-To: <77E86B5C-26AF-4D19-8984-4117097689C8@interlog.com>
From: =?UTF-8?Q?Lodewijk_andr=C3=A9_de_la_porte?= <l@odewijk.nl>
Date: Thu, 19 Dec 2013 20:05:31 +0100
To: Richard Outerbridge <outer@interlog.com>
Cc: Cryptography Mailing List <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
--===============7681380019005063086==
Content-Type: multipart/alternative; boundary=001a1133c12ea6276a04ede7d9bd
--001a1133c12ea6276a04ede7d9bd
Content-Type: text/plain; charset=UTF-8
It's all stolen from America?
Good call though. Wonder if they have their own cyphers. Maybe their
espionage works well. In that case they can know if the Americans have
tricks around their own cyphers, and they just use those that can't be
broken. Or that can be broken, in those special cases.
--001a1133c12ea6276a04ede7d9bd
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
<div dir=3D"ltr"><div class=3D"gmail_extra">It's all stolen from Americ=
a?<br><br></div><div class=3D"gmail_extra">Good call though. Wonder if they=
have their own cyphers. Maybe their espionage works well. In that case the=
y can know if the Americans have tricks around their own cyphers, and they =
just use those that can't be broken. Or that can be broken, in those sp=
ecial cases.</div>
</div>
--001a1133c12ea6276a04ede7d9bd--
--===============7681380019005063086==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============7681380019005063086==--