[3093] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Shark Oil?

daemon@ATHENA.MIT.EDU (Stephen Cobb, CISSP)
Mon Jul 27 12:02:21 1998

Date: Mon, 27 Jul 1998 10:39:31 -0400
To: Bill Neugent <wneugent@mitre.org>
From: "Stephen Cobb, CISSP" <stephen@iu.net>
Cc: cryptography@c2.net
In-Reply-To: <3.0.3.32.19980726145145.00702f94@smiley.mitre.org>

Bill

I don't mean to play stump the list, and my apologies if we have already covered this ground, but you obviously had some useful background on TriStrata...how about JAWS?

As in "unbreakable 4096-bit winner of the $5 million hacker challenge." From Calgary, formerly-E-Biz, now called JAWS Technologies, principal parties Robert Kubernuss and Ed Macnab. 

And I quote: "the Jaws "L5" routine uses the keys as a portion of the formulae to decrypt, making it mathematically impossible to break given a large enough key. The data is shifted and additionally encrypted with a random number generated at the time of encryption, used to determine password authorization upon decryption." http://www.jawstech.com.

Snake oil? Shark oil? Any data points appreciated.

Stephen


<<<< Certified Information Systems Security Professional >>>>
Director of Education & Research, /\/\iora Systems Consulting
<<ph:1.407.269.3652 http://www.miora.com fax:1.407.268.9031>>

home help back first fref pref prev next nref lref last post