From: owner-cypherpunks@toad.com
To: N/A
Message Hash: ff5ffa44e6594cde056791cd2cc86ddb4557135adeb92dd8fd44bd2de61ce02f
Message ID: <QQadwd25440.199602211050@relay3.UU.NET>
Reply To: N/A
UTC Datetime: 1996-02-21 10:55:27 UTC
Raw Date: Wed, 21 Feb 1996 18:55:27 +0800
From: owner-cypherpunks@toad.com
Date: Wed, 21 Feb 1996 18:55:27 +0800
Subject: No Subject
Message-ID: <QQadwd25440.199602211050@relay3.UU.NET>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
> > Do we have to show an exploitable flaw? Or we have to do the exploit? That
> > might be expensive. Who would judge the contest?
> >
> > The alogrithm aside, IPG provides the intial OTP. Seems to me that IPG can
> > read the messages. End of story.
> >
> Hedging, hedging, hedging - why? I did not noitice this in my first
I think he meant that it might cost him several $10000 in computing time to
actually demonstrate a flaw, should it be found. Proving the flaw exists
should be enough. If a company really needs unbreakable encryption, a few
hundred thou isn't too much for an attacker to pay for million dollar secrets.
On the other hand, it would be quite a bit for an individual to come up with,
just to illustrate a point.
And this thing about keeping a copy of the one-time-pad, now just why is it
that you need to at all?? After all, if it doesn't arrive safely, then who
knows who has it... And if so, then you don't need a copy that could, say,
accidently get smuggled out and sold to [foreign government, domestic
covernment, competitor, curious onlooker - pick one] for the right sum of
money.
For your next version, you might want to add in the capability for a slight
remixing of the random pool at both ends (a passphrase, for example)
protected by secure-hashing properly-sized chunks. There's nothing like
being able to lock the door behind you, ya know...
Don
- --
<don@cs.byu.edu> fRee cRyPTo! jOin the hUnt or BE tHe PrEY
PGP key - http://students.cs.byu.edu/~don or PubKey servers (0x994b8f39)
June 7&14, 1995: 1st amendment repealed. Junk mail to root@fryser.dk.net
* This user insured by the Smith, Wesson, & Zimmermann insurance company *
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQB1AwUBMSrSo8La+QKZS485AQFXeAL6AviaeMve7k6Oh1F5qix9EOBT29wSXXMa
NAcr8PSTFfQ7kd1FHz2A1N4OPXO+AW2vVPLWiulU/bcXoP5K/+mU36wM17bo9nXz
0tiVmyZcDV4bn6Vs373oYIKt2W0rj02K
=sJQO
-----END PGP SIGNATURE-----
Return to February 1996
Return to “owner-cypherpunks@toad.com”
1996-02-21 (Wed, 21 Feb 1996 18:55:27 +0800) - No Subject - owner-cypherpunks@toad.com