From: Yap Remailer <remailer@yap.pactitle.com>
To: cypherpunks@toad.com
Message Hash: d2cceb1f936e3ac83c5f1d2bd8eabc811304631895abea56e24d55b54eeca271
Message ID: <199607161935.MAA07689@yap.pactitle.com>
Reply To: <ae0efb9f020210046227@[205.199.118.202]>
UTC Datetime: 1996-07-18 00:58:54 UTC
Raw Date: Thu, 18 Jul 1996 08:58:54 +0800
From: Yap Remailer <remailer@yap.pactitle.com>
Date: Thu, 18 Jul 1996 08:58:54 +0800
To: cypherpunks@toad.com
Subject: Re: How I Would Ban Strong Crypto in the U.S.
In-Reply-To: <ae0efb9f020210046227@[205.199.118.202]>
Message-ID: <199607161935.MAA07689@yap.pactitle.com>
MIME-Version: 1.0
Content-Type: text/plain
> There has been some discussion at the last couple of crypto conferences
> about possible ways around this plan. (I guess the idea goes back at
> least a year or two.)
>
> One idea is to register a 2048 bit public key. You have to give the
> secret key to the government in order to use the registry. But what you
> do is to create a second key and embed it in the first. It is, say, a
> 1024 bit key which is the lower half of the 2048 bit key. It has
> different secret factors that nobody but you knows. Then when people
> send you messages they encrypt using this modulus rather than the
> official one.
>
> You get the benefit of the government-sponsored key certificate
> infrastructure, but the government is not able to crack your
> communications.
Sorry, but the government generates all keys. Otherwise people might
mess up and choose insecure keys.
Return to February 1997
Return to “Yap Remailer <remailer@yap.pactitle.com>”