-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 10/5/97 6:37 PM, Anonymous (nobody@REPLAY.COM) passed this wisdom:
Ryan Anderson wrote:
Okay - the only difference between this and a normal version of PGP is that it always encrypts to a certain key-id, in addition to all others.
That's the only weakness you'll see in it.
It's the only weakness that's needed to compromise all the keys.
It seems to me that it should not necessarily compromise all keys, though it does in effect provide for a goodly number of 'known plaintext' objects. Could some of our hardcore crypto experts comment on IDEA's susceptability to known plaintext which then provides 'plaintext' to the DH/DSS or RSA keys and what is their susceptability to 'known plaintext' It occured to me while proofreading the above that in effect a digitally signed cleartext document provides 'known plaintext' every time its used, since the SHA-1/MD-5 can be computed the hash is a 'known plaintext' on the DH/DSS and RSA keys ... is this one of the reasons for the two key types in PGP5 ??? -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNDgmJcdZgC62U/gIEQIvgwCg/kybc9ons3ji3cbi9jtSnQ3kptkAn3IC 90pwzjjpt2qqhpjn8VRlrOGR =IIkE -----END PGP SIGNATURE----- Brian B. Riley --> http://www.macconnect.com/~brianbr For PGP Keys <mailto:brianbr@together.net?subject=Get%20PGP%20Key> "Never ask what sort of computer a guy drives. If he's a Mac user, he'll tell you. If not, why embarrass him?" - Tom Clancy