From: mikeingl@news.delphi.com (MIKEINGLE@DELPHI.COM)
To: cypherpunks@toad.com
Message Hash: f3e8c4f7b09e87b4d964b731e760f4c8d5fc29d45c266a675401c49c32851e40
Message ID: <9312310552.AA11958@news.delphi.com>
Reply To: N/A
UTC Datetime: 1993-12-31 05:53:37 UTC
Raw Date: Thu, 30 Dec 93 21:53:37 PST
From: mikeingl@news.delphi.com (MIKEINGLE@DELPHI.COM)
Date: Thu, 30 Dec 93 21:53:37 PST
To: cypherpunks@toad.com
Subject: Hoax or ???
Message-ID: <9312310552.AA11958@news.delphi.com>
MIME-Version: 1.0
Content-Type: text/plain
>Path: news.delphi.com!noc.near.net!MathWorks.Com!europa.eng.gtefsd.com!library.ucla.edu!agate!usenet.ins.cwru.edu!news.ysu.edu!psuvm!auvm!DSC.BLM.GOV!cjames
>Comments: Gated by NETNEWS@AUVM.AMERICAN.EDU
>Newsgroups: comp.lang.ada
>Return-Path: <@AUVM.AMERICAN.EDU,
> @VM42.CSO.UIUC.EDU:owner-info-ada@VM1.NODAK.EDU>
>Return-Path: <@VM1.NODAK.EDU:cjames@DSC.BLM.GOV>
>X-Mailer: SCO System V Mail (version 3.2)
>Source-Info: From (or Sender) name not authenticated.
>Message-ID: <9312212330.aa07880@dsc.blm.gov>
>Date: Tue, 21 Dec 1993 23:30:25 MST
>Sender: Ada programming language <INFO-ADA@NDSUVM1.BITNET>
>From: Colin James 0621 <cjames@DSC.BLM.GOV>
>Subject: Public key encryption broken
>Comments: To: info-ada@vm1.nodak.edu
>Comments: cc: barlow@eff.org, gdean@yarrow.wt.uwa.edu.au
>Lines: 30
William H Payne originally discovered how to break RSA without factoring
by using powers of two on 10/15/90.
Mr Payne wrote a draft paper "Public Key Cryptography is Easy to
Break" on 10/16/90. The abstract (draft only) appears below:
Public key, also known as Rivest, Shamir, and Adelman,
cryptography is broken without factoring the modulus m.
The product of the encryption and the decryption exponent is
computed directly with order log(base 2) m shifts, adds, and compares.
A continued product between the modulus and its multiplier which
matches a criterion solves the Fermat-Euler theorems simply for
even very large moduli.
Mr Payne is writing a tutorial paper on the same subject with Jon
Grant which should propose a new public encryption algorithm as
a standard which can not be easily broken.
This indirectly relates to Ada in that projects in the process of
implementing public key encryption in Ada may find these advances
of value.
This information also calls into the question the validity of
patent claims for RSA.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Colin James III : Disclaimer:
BLM, SC-342D, DFC : -----------
Denver, CO 80225 : The opinions expressed here are solely
(303) 236 - 5897 : responsible for their content.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Return to January 1994
Return to “paul@poboy.b17c.ingr.com (Paul Robichaux)”