Golden Key Campaign
David Mazieres
dm at amsterdam.lcs.mit.edu
Fri Apr 26 23:03:35 PDT 1996
In article <199604251927.PAA27960 at jekyll.piermont.com> "Perry E. Metzger" <perry at piermont.com> writes:
> From: "Perry E. Metzger" <perry at piermont.com>
> cc: Bill Stewart <stewarts at ix.netcom.com>, cypherpunks at toad.com
> Date: Thu, 25 Apr 1996 15:27:04 -0400
> Reply-To: perry at piermont.com
> X-From-Line: cypherpunks-errors at toad.com Thu Apr 25 20:07:52 1996
> X-Authentication-Warning: jekyll.piermont.com: Host perry at localhost didn't use HELO protocol
> X-Reposting-Policy: redistribute only with permission
> Sender: owner-cypherpunks at toad.com
> Precedence: bulk
> Lines: 11
> Xref: amsterdam.lcs.mit.edu cypherpunks:8797
>
>
> Bill Frantz writes:
> > I will add to Bill's list:
> >
> > 7) RSA is the best known and vetted of the Public Key algorithms.
>
> Nota at all, Mr. Frantz. There are no proofs of security associated
> with RSA. Rabin has excellent proofs that breaking a message is
> strictly equivalent to factoring.
Isn't Rabin's algorithm patented, too? Perhaps the licensing terms
are better. Does anyone know for sure?
Thanks,
David
More information about the cypherpunks-legacy
mailing list