[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Pretty Good Piracy
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 10/5/97 6:37 PM, Anonymous ([email protected]) passed this wisdom:
>Ryan Anderson wrote:
>> Okay - the only difference between this and a normal version of
>> PGP is that it always encrypts to a certain key-id, in addition
>> to all others.
>>
>> That's the only weakness you'll see in it.
>
>It's the only weakness that's needed to compromise all the keys.
It seems to me that it should not necessarily compromise all keys,
though it does in effect provide for a goodly number of 'known
plaintext' objects. Could some of our hardcore crypto experts comment
on IDEA's susceptability to known plaintext which then provides
'plaintext' to the DH/DSS or RSA keys and what is their susceptability
to 'known plaintext'
It occured to me while proofreading the above that in effect a
digitally signed cleartext document provides 'known plaintext' every
time its used, since the SHA-1/MD-5 can be computed the hash is a
'known plaintext' on the DH/DSS and RSA keys ... is this one of the
reasons for the two key types in PGP5 ???
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQA/AwUBNDgmJcdZgC62U/gIEQIvgwCg/kybc9ons3ji3cbi9jtSnQ3kptkAn3IC
90pwzjjpt2qqhpjn8VRlrOGR
=IIkE
-----END PGP SIGNATURE-----
Brian B. Riley --> http://www.macconnect.com/~brianbr
For PGP Keys <mailto:[email protected]?subject=Get%20PGP%20Key>
"Never ask what sort of computer a guy drives. If he's a Mac user,
he'll tell you. If not, why embarrass him?" - Tom Clancy