Golden Key Campaign

David Mazieres dm at amsterdam.lcs.mit.edu
Fri Apr 26 23:03:35 PDT 1996


In article <199604251927.PAA27960 at jekyll.piermont.com> "Perry E. Metzger" <perry at piermont.com> writes:

> From: "Perry E. Metzger" <perry at piermont.com>
> cc: Bill Stewart <stewarts at ix.netcom.com>, cypherpunks at toad.com
> Date: Thu, 25 Apr 1996 15:27:04 -0400
> Reply-To: perry at piermont.com
> X-From-Line: cypherpunks-errors at toad.com  Thu Apr 25 20:07:52 1996
> X-Authentication-Warning: jekyll.piermont.com: Host perry at localhost didn't use HELO protocol
> X-Reposting-Policy: redistribute only with permission
> Sender: owner-cypherpunks at toad.com
> Precedence: bulk
> Lines: 11
> Xref: amsterdam.lcs.mit.edu cypherpunks:8797
> 
> 
> Bill Frantz writes:
> > I will add to Bill's list:
> > 
> > 7) RSA is the best known and vetted of the Public Key algorithms.
> 
> Nota at all, Mr. Frantz. There are no proofs of security associated
> with RSA. Rabin has excellent proofs that breaking a message is
> strictly equivalent to factoring.

Isn't Rabin's algorithm patented, too?  Perhaps the licensing terms
are better.  Does anyone know for sure?

Thanks,
David






More information about the cypherpunks-legacy mailing list