It is well accepted that the most secure encryption schemes are based on publicly known and well tested algorithms. Security depends on proper key management rather than obscurity of tecnique. Bob Ammerman RAm Systems ----- Original Message ----- From: "Olin Lathrop" To: Sent: Monday, May 13, 2002 10:19 AM Subject: Re: [PIC]: Data Encryption Using PIC16F84 > > Does anyone have any better idea of an encryption/decryption > > method to use? > > Probably, and part of what makes it better is not telling anyone how it > works. > > > ***************************************************************** > Embed Inc, embedded system specialists in Littleton Massachusetts > (978) 742-9014, http://www.embedinc.com > > -- > http://www.piclist.com hint: The list server can filter out subtopics > (like ads or off topics) for you. See http://www.piclist.com/#topics > > -- http://www.piclist.com hint: The list server can filter out subtopics (like ads or off topics) for you. See http://www.piclist.com/#topics