TIP: Click on subject to list as thread! ANSI
echo: quik_bas
to: DAVID WILLIAMS
from: RICK PEDLEY
date: 1998-05-23 22:37:00
subject: Re: Encryption

-=> Quoting David Williams to Rick Pedley <=-
 DW> Of course, there's no harm in doing some other type of juggling too,
 DW> but I'm not sure that it actually adds much to the security of the
 DW> system. For practical purposes, XORing with RND-generated numbers would
 DW> be virtually impossible to crack, except maybe by someone at the
 DW> Pentagon who has a supercomputer to play with.
Once, because I happened to be teaching computer courses in a prison,
I was asked to look at a bunch of floppy disks confiscated from some
inmate, to see whether they contained any "secret" information. It
was an interesting exercise, in part because I had no idea what sort
of information I was looking for, and also because there are so many
ways to disguise information that don't really involve encryption. I
remember looking at directory listings with some third party utility
that showed all the file attributes in a row (S H A R), and speculating
that on a disk with many files, those attributes could be used to form
letters to be read from top to bottom of the listing, like:
 
S H A
S     R
S     R
S     R
S H A
S H A
S     R
S H A R
S   A
S     R
S     R
S     R
S     R
S     R
S     R
  H A
  
  H A
S     R
S
S   A R
S     R
  H A
  H A
S     R
S
  H A
      R
S     R
  H A
In the end I decided the disks contained only what they appeared to
contain, really poor quality girlie gifs :)
--- Blue Wave/DOS v2.20
---------------
* Origin: ...the vented spleen - kingston on (613) 544-9332 (1:249/139)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.