1998-01-09 - Re: Silly Shrinkwrapped Encryption

Header Data

From: Paul Bradley <paul@fatmans.demon.co.uk>
To: Adam Back <aba@dcs.ex.ac.uk>
Message Hash: ed5cff75a963fb5da22874bd58e078f70d958cc9b829c62b11805b5773023210
Message ID: <Pine.LNX.3.91.980108150229.3198A-100000@fatmans.demon.co.uk>
Reply To: <199801062128.VAA00264@server.eternity.org>
UTC Datetime: 1998-01-09 16:20:25 UTC
Raw Date: Sat, 10 Jan 1998 00:20:25 +0800

Raw message

From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Sat, 10 Jan 1998 00:20:25 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <199801062128.VAA00264@server.eternity.org>
Message-ID: <Pine.LNX.3.91.980108150229.3198A-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain




> > I haven't seen the USG RSA key -- if it's 512 bits, that would be a humorous
> > next factoring target.

Talking of factoring I wonder if anyone on the list has seen the article 
in this months new scientist regarding a new link found between energy 
levels in hydrogen atoms and generation of large primes, I don`t remember 
the details (I only scanned the article as even the elementary 
explanation of the physics involved was beyond me), The thrust of the 
article was that work was in progress on a variant of this that could 
factor large numbers significantly faster than current methods. 
Anyone with more background in this sort of thing care to comment?

        Datacomms Technologies data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







Thread