Ron Rivest wrote:
>
> Here's a thought exercise:
>
> What happens if someone applies for an export license for a Java
> Virtual Machine, which he intends to use as an "encryption routine"?
> The idea (which is not new) is that a Java program (Java byte code)
> would be the "key" for the encryption. It specifies how to turn
> the input message into the output plaintext. Thus, the VM is doing
> the encryption work as specified by the byte-coded "key".
Of course, you can make the same argument for, say, a Pentium.
Also, anyone who has done their Turing machines 101 knows that any
Turing machine can be rewritten as data (i.e. "a key") for the universal
Turing machine...
Cheers,
Ben.
--
SECURE HOSTING AT THE BUNKER! http://www.thebunker.net/hosting.htm
http://www.apache-ssl.org/ben.html
"My grandfather once told me that there are two kinds of people: those
who work and those who take the credit. He told me to try to be in the
first group; there was less competition there."
- Indira Gandhi