[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Golden Key Campaign



In article <[email protected]> "Perry E. Metzger" <[email protected]> writes:

> From: "Perry E. Metzger" <[email protected]>
> cc: Bill Stewart <[email protected]>, [email protected]
> Date: Thu, 25 Apr 1996 15:27:04 -0400
> Reply-To: [email protected]
> X-From-Line: [email protected]  Thu Apr 25 20:07:52 1996
> X-Authentication-Warning: jekyll.piermont.com: Host perry@localhost didn't use HELO protocol
> X-Reposting-Policy: redistribute only with permission
> Sender: [email protected]
> Precedence: bulk
> Lines: 11
> Xref: amsterdam.lcs.mit.edu cypherpunks:8797
> 
> 
> Bill Frantz writes:
> > I will add to Bill's list:
> > 
> > 7) RSA is the best known and vetted of the Public Key algorithms.
> 
> Nota at all, Mr. Frantz. There are no proofs of security associated
> with RSA. Rabin has excellent proofs that breaking a message is
> strictly equivalent to factoring.

Isn't Rabin's algorithm patented, too?  Perhaps the licensing terms
are better.  Does anyone know for sure?

Thanks,
David