Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: version B 2.10.1 6/24/83; site cadvax Path: utzoo!linus!vaxine!wjh12!genrad!decvax!decwrl!amd70!cae780!ubvax!megatest!cadvax!mab From: mab@cadvax (Matt Bishop) Newsgroups: net.lang.c Subject: Re: Cbenson's data encryption technique (plea for help) Message-ID: <106@cadvax> Date: Tue, 12-Jun-84 09:31:44 EDT Article-I.D.: cadvax.106 Posted: Tue Jun 12 09:31:44 1984 Date-Received: Wed, 20-Jun-84 01:15:32 EDT References: <528@reed.UUCP>, <2347@brl-vgr.ARPA>, <3921@utzoo.UUCP> Organization: Megatest Corp., San Jose, CA Lines: 16 You can also look in Dorothy Denning's book, "Cryptography and Data Security", in the first chapter on cryptography (I think it's chapter 2, but I'm at home and my copy is at work, so I can't check that for you.) Also, I don't remember where, but I'm sure Konheim talks about it in his book "Cryptography". Unless you're REALLY mathematically inclined, try Dorothy's book first! -- Peace, Matt Bishop UUCP: decvax!decwrl!sun!megatest!mab ARPA: megatest!mab@lbl-csam