1997-02-16 - Re: (fwd) DES challenge organisation

Header Data

From: Mike Duvos <mpd@netcom.com>
To: cypherpunks@toad.com
Message Hash: e3b9bd87255ca16a3ba8efe61d30015376ffb58500e4a8179ac985f9d00f52a8
Message ID: <199702160641.WAA26922@toad.com>
Reply To: N/A
UTC Datetime: 1997-02-16 06:41:16 UTC
Raw Date: Sat, 15 Feb 1997 22:41:16 -0800 (PST)

Raw message

From: Mike Duvos <mpd@netcom.com>
Date: Sat, 15 Feb 1997 22:41:16 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: (fwd) DES challenge organisation
Message-ID: <199702160641.WAA26922@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Adam Back <aba@dcs.ex.ac.uk> writes:

 > How can this be enforced?  The RSADSI DES challenge is open
 > to all comers, and how do you prove that someone who finds
 > the key found it through this group effort?

 > I have a suspicion many people would be tempted to fill in
 > the RSA challenge form and email it in themselves.  $10,000
 > is a fair amount of money.

Of course they will.  If the unsearched portions of the keyspace
are published, you can just sit back until the odds go up and
then throw some CPU power at it.  There is no obligation on the
part of the individual who finds the key to not claim the prize
personally.

The issues of random keyspace assignment to protect against
sabotage and centralized monolithic server vs autonomous client
have been debated on the "muffin" list, where I have been
lurking, but the people in charge seem to like explicit keyspace
partitioning and servers a lot.

Should be an interesting effort.

By the way, does anyone know if des-challenge@muffin.org is
alive?  I haven't seen any messages from it in over a day and
majordomo is not responding to inquiries.

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     mpd@netcom.com     $    via Finger.                      $








Thread