1997-10-22 - wanted dead or alive: pgp5.5 key pair

Header Data

From: Adam Back <aba@dcs.ex.ac.uk>
To: cypherpunks@cyberpass.net
Message Hash: 143ac3c02006f9bff24d780c59410bdabc07f0f37803969f13c930ab02d3cb4c
Message ID: <199710212334.AAA02249@server.test.net>
Reply To: N/A
UTC Datetime: 1997-10-22 00:07:42 UTC
Raw Date: Wed, 22 Oct 1997 08:07:42 +0800

Raw message

From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 22 Oct 1997 08:07:42 +0800
To: cypherpunks@cyberpass.net
Subject: wanted dead or alive: pgp5.5 key pair
Message-ID: <199710212334.AAA02249@server.test.net>
MIME-Version: 1.0
Content-Type: text/plain




Could some kind soul who has downloaded pgp5.5 for business (I think
it is available in the US from www.pgp.com) create a key with a CMR
key extension.

I guess this means generating two keys:

  XYZ Corp recovery key <snoopy@xyz.com>

and then:

  XYZ Corp Sales <sales@xyz.com>

with the sales person's key set up to have a strict requirement to
encrypt to the XYZ "message recovery" key.

Could this kind soul then mail me, (or post here I guess would be even
more useful) both the private and public keys of both of them.

Enciphering minds want to find out how pgp5.0 reacts to this key :-)

(The question is really does pgp5.0 encrypt to the CMR key).

(btw for the curious as to why my previous message was had a date of
22nd Feb ... I had to set my clock back to get pgp5.0 beta to function
as the one I have had expired, and I forgot to set the clock forward
again).

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`






Thread