WEAK3 -- A Layman's Data Encryption Algorithm

New Message Reply About this list Date view Thread view Subject view Author view

Mok-Kong Shen (mok-kong.shen@stud.uni-muenchen.de)
Fri, 17 Jul 1998 13:29:08 +0100


As announced previously I have completed the design of WEAK3 which
combines the techniques employed in WEAK1 (now revised to contain those
in WEAK2) with the revised version of my compound PRNG that is
described in http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper9.

An implementation in Fortran 90 is available in

     http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper10

Owing to the non-trivial programming efforts required, WEAK3 does not
appear to well satisfy the requirements of a poor man's environment,
though it may be quite useful in normal environments, being
independently implementable from scratch in one to two weeks with
average programming experience. Therefore I have called it instead a
layman's data encryption algorithm, since it is designed by a layman
for use by laymen. (Hardcore professionals with their insistance on
rigorous mathematical proofs and the regulating officials taking
advices from them presumably would not have the least motivation to
examine, let alone to actually use, anything that is WEAK by name.)

I wish to thank TPS for helpful discussions and a walkthrough of the
program. (Any eventual errors remaining are exclusively mine.)

Critiques, comments and suggestions for improvement are sincerely
solicited.

M. K. Shen


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:20:32 ADT