Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!mnetor!seismo!lll-lcc!ptsfa!well!rab From: rab@well.UUCP (Bob Bickford) Newsgroups: sci.crypt Subject: Re: encryption with public keys Message-ID: <2248@well.UUCP> Date: Tue, 23-Dec-86 07:04:49 EST Article-I.D.: well.2248 Posted: Tue Dec 23 07:04:49 1986 Date-Received: Tue, 23-Dec-86 21:42:21 EST References: <3072@ihuxf.UUCP> Organization: Whole Earth Lectronic Link, Sausalito, CA Lines: 14 Summary: ACM article There was an excellent article on this general subject in the October 1985 issue of _Communications of the ACM_ in which the author presents scenarios showing how to use a given encryption system to build an information-secure society (in other words, keeping your privacy!). I recommend it. -- Robert Bickford {lll-crg,hplabs}!well!rab terrorist, cryptography, DES, drugs, cipher, secret, decode, NSA, CIA, NRO. The above is food for the NSA line eater. Add it to your .signature and you too can help overflow the NSA's ability to scan all traffic going in or out of the USA looking for "significant" words. (This is not a joke, sadly.)