Mok-Kong Shen (mok-kong.shen@stud.uni-muenchen.de)
Fri, 17 Jul 1998 13:29:08 +0100
As announced previously I have completed the design of WEAK3 which
combines the techniques employed in WEAK1 (now revised to contain those
in WEAK2) with the revised version of my compound PRNG that is
described in http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper9.
An implementation in Fortran 90 is available in
http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper10
Owing to the non-trivial programming efforts required, WEAK3 does not
appear to well satisfy the requirements of a poor man's environment,
though it may be quite useful in normal environments, being
independently implementable from scratch in one to two weeks with
average programming experience. Therefore I have called it instead a
layman's data encryption algorithm, since it is designed by a layman
for use by laymen. (Hardcore professionals with their insistance on
rigorous mathematical proofs and the regulating officials taking
advices from them presumably would not have the least motivation to
examine, let alone to actually use, anything that is WEAK by name.)
I wish to thank TPS for helpful discussions and a walkthrough of the
program. (Any eventual errors remaining are exclusively mine.)
Critiques, comments and suggestions for improvement are sincerely
solicited.
M. K. Shen
The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:20:32 ADT