Pretty Good Piracy

Brian B. Riley brianbr at together.net
Sun Oct 5 17:03:27 PDT 1997



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/5/97 6:37 PM, Anonymous (nobody at REPLAY.COM)  passed this wisdom:

>Ryan Anderson wrote:
>> Okay - the only difference between this and a normal version of 
>> PGP is that it always encrypts to a certain key-id, in addition
>> to all others.
>> 
>> That's the only weakness you'll see in it.
>
>It's the only weakness that's needed to compromise all the keys.

 It seems to me that it should not necessarily compromise all keys,
though it does in effect provide for a goodly number of 'known
plaintext' objects. Could some of our hardcore crypto experts comment
on IDEA's susceptability to known plaintext which then provides
'plaintext' to the DH/DSS or RSA keys and what is their susceptability
to 'known plaintext'

 It occured to me while proofreading the above that in effect a
digitally signed cleartext document provides 'known plaintext' every
time its used, since the SHA-1/MD-5 can be computed the hash is a
'known plaintext' on the  DH/DSS and RSA keys ... is this one of the
reasons for the two key types in PGP5 ???


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNDgmJcdZgC62U/gIEQIvgwCg/kybc9ons3ji3cbi9jtSnQ3kptkAn3IC
90pwzjjpt2qqhpjn8VRlrOGR
=IIkE
-----END PGP SIGNATURE-----


Brian B. Riley --> http://www.macconnect.com/~brianbr
  For PGP Keys  <mailto:brianbr at together.net?subject=Get%20PGP%20Key>

  "Never ask what sort of computer a guy drives. If he's a Mac user,
   he'll tell you. If not, why embarrass him?" - Tom Clancy 








More information about the cypherpunks-legacy mailing list