[2352] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Rivest's Wheat & Chaff - A crypto alternative

daemon@ATHENA.MIT.EDU (Anonymous)
Tue Mar 24 23:06:36 1998

Date: Wed, 25 Mar 1998 01:25:08 +0100 (MET)
From: Anonymous <nobody@REPLAY.COM>
To: cryptography@c2.net

Take a look at how the regs are actually worded.  This is 5A002 of
15 CFR 774, the Commerce Control List.

: List of Items Controlled
: 
: Items:
: 
:     a. Designed or modified to use ``cryptography'' employing digital 
:        techniques to ensure ``information security'';
:     b. Designed or modified to perform cryptanalytic functions;
:     c. Designed or modified to use ``cryptography'' employing analog 
:        techniques to ensure ``information security'';
: 
: ... a bunch more, not relevant ...
: 
:     Note: 5A002 does not control:
: 
: ... skipping some, we come to ...
: 
:     g. Data authentication equipment that calculates a Message 
: Authentication Code (MAC) or similar result to ensure no alteration of 
: text has taken place, or to authenticate users, but does not allow for 
: encryption of data, text or other media other than that needed for the 
: authentication;

(g) is the exemption which Ron Rivest is trying to exploit.  But once
you set up your MAC system so that it provides secrecy, you lose the
exemption.

home help back first fref pref prev next nref lref last post