[3789] in cryptography@c2.net mail archive
Re: Wassenaar summary (and a funny new loophole)
daemon@ATHENA.MIT.EDU (Ben Laurie)
Sun Dec 13 19:11:52 1998
Date: Thu, 10 Dec 1998 19:06:29 +0000
From: Ben Laurie <ben@algroup.co.uk>
To: "Ulf Möller" <ulf@fitug.de>
CC: cryptography@c2.net, cypherpunks@toad.com
Ulf Möller wrote:
> Since the definition differentiates algorithms by symmetry rather than by
> their cryptographic properties, there is no restriction whatsoever on
> asymmetric secret-key encryption algorithms. Those algorithms typically
> are not based on factorization or discrete logarithms. That is, they are
> no longer controlled by the Wassenaar arrangement.
Hmm - so if I defined a new crytpo algorithm, SED3, say, that looks like
this:
SED3(k,x)=3DES(backwards(k),x)
where backwards(k) is k with its bits written backwards, then the
3DES/SED3(k1,k2) combination is exportable (where k1 is related to k2,
of course, by k2=backwards(k1))?
Cheers,
Ben.
--
Ben Laurie |Phone: +44 (181) 735 0686| Apache Group member
Freelance Consultant |Fax: +44 (181) 735 0689|http://www.apache.org/
and Technical Director|Email: ben@algroup.co.uk |
A.L. Digital Ltd, |Apache-SSL author http://www.apache-ssl.org/
London, England. |"Apache: TDG" http://www.ora.com/catalog/apache/