From: Raph Levien <raph@CS.Berkeley.EDU>
To: Lance Cottrell <loki@obscura.com>
Message Hash: adfdccfc873aefcaf0cb160c686325095aabb9a0e4e8e3d78e1021581203be6e
Message ID: <199511090147.RAA31271@kiwi.cs.berkeley.edu>
Reply To: <199511081943.LAA24863@kiwi.cs.berkeley.edu>
UTC Datetime: 1995-11-09 02:44:36 UTC
Raw Date: Thu, 9 Nov 1995 10:44:36 +0800
From: Raph Levien <raph@CS.Berkeley.EDU>
Date: Thu, 9 Nov 1995 10:44:36 +0800
To: Lance Cottrell <loki@obscura.com>
Subject: Re: PGP Comment feature weakens remailer security
In-Reply-To: <199511081943.LAA24863@kiwi.cs.berkeley.edu>
Message-ID: <199511090147.RAA31271@kiwi.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain
> I think you are fine if the odds of corrupting the message are less than
> the odds of getting hit by a a falling meteor while running the program.
> In general there is little point in making any one part of the system
> many orders of magnitude more reliable than any other part.
I agree entirely. That's why my PGP key at school is 382 bits. It's a
lot easier to compromise my machine than factor a 382 bit number.
So let me rephrase the question: what's the minimum number of entropy
bits that can be used and still give you that warm and fuzzy feeling
that you don't have to worry about the possibility that the message
might be corrupted?
The winning answer gets a free mention in the PGP/MIME Implementation
notes Web page: http://www.c2.org/~raph/impl.html
Raph
Return to November 1995
Return to “Raph Levien <raph@CS.Berkeley.EDU>”