1995-07-22 - RE: Doling out keyspace (was Re: There is no True Key)

Header Data

From: Bolivar Shagnasty <tj@compassnet.com>
To: cypherpunks@toad.com
Message Hash: 3aeb2fe9f0b7540c26c66bf62daf0c197efcb06b967568c4da68c5f0b3a2fc90
Message ID: <Chameleon.4.01.2.950722182221.tj@tjunker.compassnet.com>
Reply To: N/A
UTC Datetime: 1995-07-22 23:23:42 UTC
Raw Date: Sat, 22 Jul 95 16:23:42 PDT

Raw message

From: Bolivar Shagnasty <tj@compassnet.com>
Date: Sat, 22 Jul 95 16:23:42 PDT
To: cypherpunks@toad.com
Subject: RE: Doling out keyspace (was Re: There is no True Key)
Message-ID: <Chameleon.4.01.2.950722182221.tj@tjunker.compassnet.com>
MIME-Version: 1.0
Content-Type: text/plain


> > - Each helper requests N bits of keyspace.
> > - That chunk is doled out "randomly" by the server.

>Is there any reason why the server should have to dole out the in the
>first place? If a reasonable seed is available, there's no reason each
>helper couldn't just generate a random starting key on its own (with a
>uniform distribution). 

The owner of the key being cracked jumps in and "randomly" selects the part 
of the keyspace containing the key, then reports back in the negative.

This defense of the key is reduced if the server doles out pieces of the 
keyspace randomly, selected only for size, and further reduced if the same 
space is given out multiple times to different requestors. 

Bolivar







Thread