From: tcmay@netcom.com (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: 4aaeff1d53e508409c127a411a7171d166e895746a998638dcfa9d81423e325a
Message ID: <199407041851.LAA17276@netcom5.netcom.com>
Reply To: N/A
UTC Datetime: 1994-07-04 18:47:53 UTC
Raw Date: Mon, 4 Jul 94 11:47:53 PDT
From: tcmay@netcom.com (Timothy C. May)
Date: Mon, 4 Jul 94 11:47:53 PDT
To: cypherpunks@toad.com
Subject: Question for PGP Gurus
Message-ID: <199407041851.LAA17276@netcom5.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
PGP gurus,
I don't follow the ins and outs of PGP very closely, and I can't find
anything on this directly in my archived articles.
Someone has told me that pre-MIT versions of PGP may have compromised
security because "the session key is hashed solely from the
plaintext."
Is this true? What's the significance? Is there any weakness?
Thanks,
--Tim
--
..........................................................................
Timothy C. May | Crypto Anarchy: encryption, digital money,
tcmay@netcom.com | anonymous networks, digital pseudonyms, zero
408-688-5409 | knowledge, reputations, information markets,
W.A.S.T.E.: Aptos, CA | black markets, collapse of governments.
Higher Power: 2^859433 | Public Key: PGP and MailSafe available.
"National borders are just speed bumps on the information superhighway."
Return to July 1994
Return to “tcmay@netcom.com (Timothy C. May)”