1994-07-04 - Question for PGP Gurus

Header Data

From: tcmay@netcom.com (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: 4aaeff1d53e508409c127a411a7171d166e895746a998638dcfa9d81423e325a
Message ID: <199407041851.LAA17276@netcom5.netcom.com>
Reply To: N/A
UTC Datetime: 1994-07-04 18:47:53 UTC
Raw Date: Mon, 4 Jul 94 11:47:53 PDT

Raw message

From: tcmay@netcom.com (Timothy C. May)
Date: Mon, 4 Jul 94 11:47:53 PDT
To: cypherpunks@toad.com
Subject: Question for PGP Gurus
Message-ID: <199407041851.LAA17276@netcom5.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



PGP gurus, 

I don't follow the ins and outs of PGP very closely, and I can't find
anything on this directly in my archived articles.

Someone has told me that pre-MIT versions of PGP may have compromised
security because "the session key is hashed solely from the
plaintext."

Is this true? What's the significance? Is there any weakness?


Thanks,

--Tim


-- 
..........................................................................
Timothy C. May         | Crypto Anarchy: encryption, digital money,  
tcmay@netcom.com       | anonymous networks, digital pseudonyms, zero
408-688-5409           | knowledge, reputations, information markets, 
W.A.S.T.E.: Aptos, CA  | black markets, collapse of governments.
Higher Power: 2^859433 | Public Key: PGP and MailSafe available.
"National borders are just speed bumps on the information superhighway."




Thread