* [EMAIL PROTECTED] <[EMAIL PROTECTED]> [000403 03:27]:
> > Or, should I perhaps be more interested in coming up with a stream
> > cipher that I could use in conjunction with the java streams?
> 
> Sounds like you don't have much experience in the crypto field. Given that,
> you should NOT try to invent an algorithm for production systems.

Absolutely correct -- I am not inventing anything. I am getting all my
algorithms from Schneier. I haven't decided yet if I want to do a
public-key system to use coin-flipping to build a session key for a
symmetric cipher, or if I want to use hashes for the coin-flipping.

I wasn't planning on blazing new territory. :)

I just want to know if an object encrypted in one VM can be decrypted
and used in another VM, which is probably over the network.

Thanks for your concern. :)

-- 
Seth Arnold | http://www.willamette.edu/~sarnold/
Hate spam? See http://maps.vix.com/rbl/ for help

Reply via email to