1995-11-26 - Re: Cypherpunk Certification Authority

Header Data

From: chen@intuit.com (Mark Chen)
To: adam@lighthouse.homeport.org (Adam Shostack)
Message Hash: a02716a7cdf1cf76df847cbc683f98d869233ba59fb8b14c62ccfadf2c9d507f
Message ID: <9511260216.AA23306@doom.intuit.com>
Reply To: <199511252105.QAA08724@homeport.org>
UTC Datetime: 1995-11-26 02:26:44 UTC
Raw Date: Sun, 26 Nov 1995 10:26:44 +0800

Raw message

From: chen@intuit.com (Mark Chen)
Date: Sun, 26 Nov 1995 10:26:44 +0800
To: adam@lighthouse.homeport.org (Adam Shostack)
Subject: Re: Cypherpunk Certification Authority
In-Reply-To: <199511252105.QAA08724@homeport.org>
Message-ID: <9511260216.AA23306@doom.intuit.com>
MIME-Version: 1.0
Content-Type: text/plain



> | C) Don't settle for less than X.509 ver 3, because this allows the 
> | certificate to carry within it a reference to the location of the CRL 
> | list.  Use that feature.
> 
> 	Does X.509 version 3 fix the problem that Ross Anderson points
> out in his 'Robustness Principles' paper? (Crypto '95 proceedings, or
> ftp.cl.cam.ac.uk/users/rja14/robustness.ps.Z)

I don't believe that it does.

For those who missed it, the problem is that the encryptor in an
encrypt-before-signing protocol is able to use his knowledge of the
factorization of the encryption modulus to compute a discrete log, and
forge another message for which the signature is also valid (after
registering the new exponent).

   - Mark -



--
Mark Chen 
chen@intuit.com
415/329-6913
finger for PGP public key
D4 99 54 2A 98 B1 48 0C  CF 95 A5 B0 6E E0 1E 1D





Thread