From: mgream@acacia.itd.uts.edu.au (Matthew Gream)
To: hayden@krypton.mankato.msus.edu (Robert A. Hayden)
Message Hash: 6db7162e189da2a130bc11302d7a0cf2e8b94b654f376367065f9129c949f2a9
Message ID: <9405252255.AA09419@acacia.itd.uts.EDU.AU>
Reply To: <Pine.3.89.9405251412.A25354-0100000@krypton.mankato.msus.edu>
UTC Datetime: 1994-05-25 22:53:36 UTC
Raw Date: Wed, 25 May 94 15:53:36 PDT
From: mgream@acacia.itd.uts.edu.au (Matthew Gream)
Date: Wed, 25 May 94 15:53:36 PDT
To: hayden@krypton.mankato.msus.edu (Robert A. Hayden)
Subject: Re: PGP 2.6 is dangerous in the long term ?
In-Reply-To: <Pine.3.89.9405251412.A25354-0100000@krypton.mankato.msus.edu>
Message-ID: <9405252255.AA09419@acacia.itd.uts.EDU.AU>
MIME-Version: 1.0
Content-Type: text/plain
Earlier, Robert A. Hayden wrote:
> > Bizdos and gang will _still_ hold the patent on RSA-style public key
> > encryption. What you're suggesting is, in essence, exactly what Phil
> > Zimmerman did with PGP 1.0.
>
> Ah, ok. I wasn't sure if the patent covered just the use of the
> algorithm or also the use of public-key-like systems. As I said, I am
> most likely completely wrong :-)
Not if you're referring to some form of "PGP:ng" or otherwise similar
software that can interrogate and support several possible public key
algorithms. The ASN.1 encoded PKCS packets are deliberately designed
with algorithmic identifiers so that "smart" software can entertain not
just RSA, but say El-Gamal or DSA algorithms -- in fact, anything you
car to devise. The same applies to symmetric encryption and signature
packets.
One could piss off RSA entirely and go with DSA, whose only
disadvantage being ciphertext doubling is so trivial it doesn't warrant
a mention.
Matthew.
--
Matthew Gream
Consent Technologies
Sydney, (02) 821-2043
M.Gream@uts.edu.au
Return to May 1994
Return to ““Robert A. Hayden” <hayden@krypton.mankato.msus.edu>”