> [...]
> I'm not saying I could "break" it. I'm just saying that, given two
> bit streams, A and B, I could tell whether they were generated by the
> same encryption algorithm, or different algorithms.
Good for you, I certainly couldn't. As somebody said, you probably could
so in case RC4, which seems to be a pathological case, showing a
fingerprint, but then, most algorithms don't.
ciao,
'gene
> Lyle