in reply to Re: Low level operations
in thread Low level operations

"only the algorithm (which, incidentally you just posted on the internet)."

This is actually a good thing. All crypto algorithms should be open.It builds trust and people are able to see how the algorithm works so they can sort the good algorithms from the bad ones.
The security issue is how the algorithm is implemented in software.

Replies are listed 'Best First'.
Re: Re: Re: Low level operations
by thor (Priest) on Oct 09, 2002 at 12:58 UTC
    And I agree whole heartedly that making crypto algorithms public increases their ability to be trusted through peer review. However, if the original poster were relying on the algotithm alone for security, then he shot himself in the foot (again). Also, to call this a crypto algorighm is like calling ROT-13 an crypto algorithm. To paraphrase Kelly Bundy from 'Married with Children': "You may as well have locked it with a piece of chewing gum".

    thor

Re: Re: Re: Low level operations
by Anonymous Monk on Oct 09, 2002 at 10:51 UTC
    An algorithm which consists of moving a few bits around and then an xor is not a good crypto algorithm.
      Exactly. Thank you for proving my point!
      Therefor noone should use it.
      What if the algorithm was hidden in a application?

      Which of course, proves the previous A. Monks point - if this algorithmn hadn't been shown and discussed, someone might think that it was.