[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Golden Key Campaign
In article <[email protected]> "Perry E. Metzger" <[email protected]> writes:
> From: "Perry E. Metzger" <[email protected]>
> cc: Bill Stewart <[email protected]>, [email protected]
> Date: Thu, 25 Apr 1996 15:27:04 -0400
> Reply-To: [email protected]
> X-From-Line: [email protected] Thu Apr 25 20:07:52 1996
> X-Authentication-Warning: jekyll.piermont.com: Host perry@localhost didn't use HELO protocol
> X-Reposting-Policy: redistribute only with permission
> Sender: [email protected]
> Precedence: bulk
> Lines: 11
> Xref: amsterdam.lcs.mit.edu cypherpunks:8797
>
>
> Bill Frantz writes:
> > I will add to Bill's list:
> >
> > 7) RSA is the best known and vetted of the Public Key algorithms.
>
> Nota at all, Mr. Frantz. There are no proofs of security associated
> with RSA. Rabin has excellent proofs that breaking a message is
> strictly equivalent to factoring.
Isn't Rabin's algorithm patented, too? Perhaps the licensing terms
are better. Does anyone know for sure?
Thanks,
David