-----BEGIN PGP SIGNED MESSAGE----- In list.cypherpunks, someone wrote:
Note that RSA normally is used as probabilistic encryption: encrypt the same plaintext twice, and you'll likely get two different ciphertexts.
I think you're confusing PGP's use of random session keys and random padding with actual RSA encryption. Using RSA alone on a given plaintext will always give you the same ciphertext. - -- Roy M. Silvernail [ ] roy@cybrspc.mn.org PGP Public Key fingerprint = 31 86 EC B9 DB 76 A7 54 13 0B 6A 6B CC 09 18 B6 Key available from pubkey@cybrspc.mn.org -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMQN/6Rvikii9febJAQGCwwP+LGSeA56pCk9kFIULEuNX9B7VxBV5oYho y2JsyjdrJayUzVDS6iqhzFSrHHM8QSq3C3MlAmriXx52BdbFOZZ6lduV35hZKAjb TELDjeKixe/8BiDajP+98XcOSABqhTgvG/QgXV12dyuvr6uJETw8v1m5VkHH+svn BElJdmt5ZL8= =Dc+e -----END PGP SIGNATURE-----