Ron Rivest wrote:
> 
> Here's a thought exercise:
> 
> What happens if someone applies for an export license for a Java
> Virtual Machine, which he intends to use as an "encryption routine"?
> The idea (which is not new) is that a Java program (Java byte code)
> would be the "key" for the encryption.  It specifies how to turn
> the input message into the output plaintext.  Thus, the VM is doing
> the encryption work as specified by the byte-coded "key".

Of course, you can make the same argument for, say, a Pentium.

Also, anyone who has done their Turing machines 101 knows that any
Turing machine can be rewritten as data (i.e. "a key") for the universal
Turing machine...

Cheers,

Ben.

--
SECURE HOSTING AT THE BUNKER! http://www.thebunker.net/hosting.htm

http://www.apache-ssl.org/ben.html

"My grandfather once told me that there are two kinds of people: those
who work and those who take the credit. He told me to try to be in the
first group; there was less competition there."
     - Indira Gandhi

Reply via email to