[2328] in cryptography@c2.net mail archive
Re: Encryption without encryption - from Ron Rivest
daemon@ATHENA.MIT.EDU (Mike Rosing)
Mon Mar 23 16:58:53 1998
Date: Mon, 23 Mar 1998 12:17:30 -0600 (CST)
From: Mike Rosing <cryptech@Mcs.Net>
cc: cypherpunks@cyberpass.net, cryptography@c2.net
In-Reply-To: <199803221925.UAA06062@basement.replay.com>
On Sun, 22 Mar 1998, Anonymous wrote:
> Rivest's idea is a very clever attempt to circumvent the export
> regulations. It's not clear that it will succeed in this.
Read the original paper. He clearly points out that all parties
do not break any laws, and that law enforcement can have access
to the original data if they tap the correct line. That can be
made hard to do.
[....]
> By that analysis, Rivest's technique is an encryption program,
> irrespective of the specific technology used to achieve secrecy. It is
> unlikely to be exportable.
>
It's message expansion, like stegonagraphy. The data is in the
clear, so there is no encryption. If all the action takes place in
one computer, then *maybe* you could call it encryption, but that
would be stretching the definition. Which is Rivist's point, the
whole debate is bogus, and can be made more bogus with a little
inginuity.
Patience, persistence, truth,
Dr. mike