1997-08-13 - Re: Encrypting same data with many keys…

Header Data

From: Ray Arachelian <sunder@brainlink.com>
To: Bill Stewart <stewarts@ix.netcom.com>
Message Hash: 7894120b26290af5c02c1fd5d3a49ac7b4b66959c2b016a82bff1311b455c85c
Message ID: <Pine.SUN.3.96.970813170421.7599R-100000@beast.brainlink.com>
Reply To: <3.0.2.32.19970813003535.0068e9b4@popd.ix.netcom.com>
UTC Datetime: 1997-08-13 21:16:00 UTC
Raw Date: Thu, 14 Aug 1997 05:16:00 +0800

Raw message

From: Ray Arachelian <sunder@brainlink.com>
Date: Thu, 14 Aug 1997 05:16:00 +0800
To: Bill Stewart <stewarts@ix.netcom.com>
Subject: Re: Encrypting same data with many keys...
In-Reply-To: <3.0.2.32.19970813003535.0068e9b4@popd.ix.netcom.com>
Message-ID: <Pine.SUN.3.96.970813170421.7599R-100000@beast.brainlink.com>
MIME-Version: 1.0
Content-Type: text/plain



On Wed, 13 Aug 1997, Bill Stewart wrote:

> The actual data is encrypted with IDEA, but the identical IDEA key is 
> encrypted with each recipient's RSA key.  To avoid this attack,
> PGP uses random padding after the IDEA key (which makes the message
> encrypted with RSA different for each recipient, avoiding the trap.
> Since IDEA keys are 128 bits long, and RSA moduli are typically 384-2047,
> there's plenty of room for random noise in the format.)

Would it not be more secure if it picked a different IDEA session key for
each recipient?  Would be slower, but...

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder@sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






Thread