From: Gary Howland <gary@systemics.com>
To: Simon Spero <ses@tipper.oit.unc.edu>
Message Hash: be53a2a52c51b5d98d2898513508a32a66ab6cacbfed2e9e4c83b0f4e2eb99c0
Message ID: <32353E6F.63DECDAD@systemics.com>
Reply To: <Pine.SUN.3.91.960909180122.23624B-100000@tipper.oit.unc.edu>
UTC Datetime: 1996-09-10 12:59:18 UTC
Raw Date: Tue, 10 Sep 1996 20:59:18 +0800
From: Gary Howland <gary@systemics.com>
Date: Tue, 10 Sep 1996 20:59:18 +0800
To: Simon Spero <ses@tipper.oit.unc.edu>
Subject: Re: Crypto Num Mum, Hmm
In-Reply-To: <Pine.SUN.3.91.960909180122.23624B-100000@tipper.oit.unc.edu>
Message-ID: <32353E6F.63DECDAD@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain
Simon Spero wrote:
>
> It's kind of tempting to generate the key and certificate using this as q
> and the previous largest as p, if only for machismo at keysignings :-)
The machismo is that you know for sure your numbers are prime, rather
than being 99.999999% confident that they are. It is not hard to
generate prime numbers this large, it's just hard to prove they are
really prime. (Someobdy please correct me if I'm wrong about this).
Gary
--
"Of course the US Constitution isn't perfect; but it's a lot better
than what we have now." -- Unknown.
pub 1024/C001D00D 1996/01/22 Gary Howland <gary@systemics.com>
Key fingerprint = 0C FB 60 61 4D 3B 24 7D 1C 89 1D BE 1F EE 09 06
Return to September 1996
Return to “Simon Spero <ses@tipper.oit.unc.edu>”