From: “A. Padgett Peterson P.E. Information Security” <PADGETT@hobbes.orl.mmc.com>
To: cypherpunks@toad.com
Message Hash: 53d79e22aea553a3f491d7a3a9dccff2bd71134766c2e428ba830eff67bbca81
Message ID: <960302193021.20202137@hobbes.orl.mmc.com>
Reply To: N/A
UTC Datetime: 1996-03-03 00:43:38 UTC
Raw Date: Sun, 3 Mar 1996 08:43:38 +0800
From: "A. Padgett Peterson P.E. Information Security" <PADGETT@hobbes.orl.mmc.com>
Date: Sun, 3 Mar 1996 08:43:38 +0800
To: cypherpunks@toad.com
Subject: Random keys ?
Message-ID: <960302193021.20202137@hobbes.orl.mmc.com>
MIME-Version: 1.0
Content-Type: text/plain
> This does not demonstrate that the RSA keys are as well
>distributed, but it does generate some confidence that the key
>generation methods of PGP are not very broken. Testing for RSA
>generation would be more difficult, since there are some practical
>difficulties in getting a large sample of RSA private keys.
True but do not need private keys, just public ones (one to one relation),
should be able to get a large sample (20,000 in one place did I hear ?)
of those.
Warmly,
Padgett
Return to March 1996
Return to ““A. Padgett Peterson P.E. Information Security” <PADGETT@hobbes.orl.mmc.com>”
1996-03-03 (Sun, 3 Mar 1996 08:43:38 +0800) - Random keys ? - “A. Padgett Peterson P.E. Information Security” <PADGETT@hobbes.orl.mmc.com>