From owner-freebsd-chat Thu May 8 07:15:48 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id HAA29026 for chat-outgoing; Thu, 8 May 1997 07:15:48 -0700 (PDT) Received: from cais.cais.com (root@cais.com [199.0.216.4]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id HAA29020 for ; Thu, 8 May 1997 07:15:46 -0700 (PDT) Received: from earth.mat.net (root@earth.mat.net [205.252.122.1]) by cais.cais.com (8.8.5/8.7.3) with SMTP id KAA05207 for ; Thu, 8 May 1997 10:15:39 -0400 (EDT) Received: from Journey2.mat.net (journey2.mat.net [205.252.122.116]) by earth.mat.net (8.6.12/8.6.12) with SMTP id KAA28592 for ; Thu, 8 May 1997 10:15:36 -0400 Date: Thu, 8 May 1997 10:14:58 -0400 (EDT) From: Chuck Robey To: FreeBSD-chat@FreeBSD.org Subject: New IBM public key algorithm (fwd) Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-chat@FreeBSD.org X-Loop: FreeBSD.org Precedence: bulk This is another forward from the crypto list (of which you've probably seen me post before). This one is of interest because it's an entirely new public key crypto system, and the http is a pointer to a mathematical description. I haven't had time yet to go into it, but the description seems pretty complete. ----------------------------+----------------------------------------------- Chuck Robey | Interests include any kind of voice or data chuckr@eng.umd.edu | communications topic, C programming, and Unix. 9120 Edmonston Ct #302 | Greenbelt, MD 20770 | I run Journey2 and picnic, both FreeBSD (301) 220-2114 | version 3.0 current -- and great FUN! ----------------------------+----------------------------------------------- ---------- Forwarded message ---------- Date: Wed, 7 May 1997 13:33:00 -0500 From: Bob Geiger To: coderpunks@toad.com, cryptography@c2.net Subject: New IBM public key algorithm On May 7, IBM announced that two of its research scientists created the world's first public-key encryption scheme that provides a mathematically proven uniform level of protection for keeping confidential computer data private. from- http://www.ibm.com/News/1997/05/ls970507.html If they can make it practical from a speed/resources perspective this will be very interesting (and you thought elliptic curve math was complicated! ;-) Interesting work. Bob Geiger Motorola, Inc.