From: watson@tds.com
To: David Lesher <wb8foz@nrk.com>
Message Hash: 56ac933e7fb05c0cf177f9f9664a000ba91fa67f410fc4c4e692cc6d80d7c0a4
Message ID: <Pine.SOL.3.91.960415234347.5127B-100000@mailman.tds.com>
Reply To: <199604152026.QAA31962@nrk.com>
UTC Datetime: 1996-04-16 10:20:26 UTC
Raw Date: Tue, 16 Apr 1996 18:20:26 +0800
From: watson@tds.com
Date: Tue, 16 Apr 1996 18:20:26 +0800
To: David Lesher <wb8foz@nrk.com>
Subject: Re: Article on PGP flaws
In-Reply-To: <199604152026.QAA31962@nrk.com>
Message-ID: <Pine.SOL.3.91.960415234347.5127B-100000@mailman.tds.com>
MIME-Version: 1.0
Content-Type: text/plain
On Mon, 15 Apr 1996, David Lesher wrote:
> I'm told a periodical:
> Crypto & Security
> Vol 15 #1
> has an article:
> Probabilistic [sp] Flaws in PGP {aprox title}
> by Thierry Moreau
>
> Has anyone seen/commented on it?
...
Actually it's Computers and Security. Complains about the PRNG. Says if
someone gets your randseed.bin they can infer the PRNG output sequence
and your IDEA key. Doesn't develop in any detail. Says the IDEA key
should be chosen from _truly_ random numbers.
And this is an expensive magazine.
Return to April 1996
Return to “watson@tds.com”