[net.followup] Big Brother? psaw!

biep@klipper.UUCP (J. A. "Biep" Durieux) (01/02/85)

[]
	Several weeks ago I mailed an encryption algorithm to some people
on the net I think I could trust. This was shortly after the Big Brother
paranoia started. It is an algorithm I invented myself, and it has really
nice properties. I know of no method (besides decoding) to discern between
a coded message and garbage. The encoding is a one-to-many mapping, and
the algorithm makes an extensive use of a random number generator. This
affects the length of the message as well. 
Together with it, I distributed a keyword generator, which uses about all
constant data in the article header. Both were to be distributed further.

If you have not yet received it, just wait for some more time. If you
still don't have got it then, probably nobody trusts you enough. :-)

Once more the rules of the game:

1) All articles encrypted in this way should contain `NSAcrypt' in the
	header.

2) It is not allowed to leave either a description of the algorithm, or
	an encryptor (in whatever language) on any multiple-access system
	(i.e. a system which others can login onto). It is allowed to read
	in a program from tape or floppy, use it, and delete it again,
	**p*r*o*v*i*d*e*d** that deletion really means deletion, and not
	"user-friendly" storing it elsewhere.

3) It is not allowed to provide both a plain and an encrypted version of
	the same article. Neither is it allowed to provide any other keys
	to breaking the algorithm.

4) Distribution of the algorithms provided is:
	- Greatly encouraged, to people you know well and trust well
	- Forbidden, to anyone else.

5) It is forbidden to reveal the names of those whom the algorithm is 
	given to. They can reveal themselves by posting articles, but
	should not be made subject to NSA persecution by others.

6) Keys or key generator algorithms for NSAcrypt may only be transmitted
	in encrypted form. So, while private mail may be encrypted with
	another key, this key may be mailed only in an NSAcrypted letter.
	Use of time dependent algorithms is greatly encouraged.



P.S.: Don't mail me for copies of the algorithms: they will reach you in
	time.
-- 

							  Biep.
	{seismo|decvax|philabs}!mcvax!vu44!botter!klipper!biep

I utterly disagree with  everything  you are saying,  but I 
am prepared to fight to the death for your right to say it.
							--Voltaire

faustus@ucbcad.UUCP (01/05/85)

I cedrtainly hope that nobody actually starts to post encrypted
articles to the net, when the encryption program isn't built into
readnews or something. Mailing lists would be more appropriate for
this kind of thing.

	Wayne