From: mpd@netcom.com (Mike Duvos)
To: cypherpunks@toad.com
Message Hash: 417d2b7a7703e235da08430ee7740fa4857cfb98d535bcccda054cff879a42ab
Message ID: <199702160222.SAA10114@netcom21.netcom.com>
Reply To: <199702152256.WAA00403@server.test.net>
UTC Datetime: 1997-02-16 02:22:56 UTC
Raw Date: Sat, 15 Feb 1997 18:22:56 -0800 (PST)
From: mpd@netcom.com (Mike Duvos)
Date: Sat, 15 Feb 1997 18:22:56 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: (fwd) DES challenge organisation
In-Reply-To: <199702152256.WAA00403@server.test.net>
Message-ID: <199702160222.SAA10114@netcom21.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
Adam Back <aba@dcs.ex.ac.uk> writes:
> How can this be enforced? The RSADSI DES challenge is open
> to all comers, and how do you prove that someone who finds
> the key found it through this group effort?
> I have a suspicion many people would be tempted to fill in
> the RSA challenge form and email it in themselves. $10,000
> is a fair amount of money.
Of course they will. If the unsearched portions of the keyspace
are published, you can just sit back until the odds go up and
then throw some CPU power at it. There is no obligation on the
part of the individual who finds the key to not claim the prize
personally.
The issues of random keyspace assignment to protect against
sabotage and centralized monolithic server vs autonomous client
have been debated on the "muffin" list, where I have been
lurking, but the people in charge seem to like explicit keyspace
partitioning and servers a lot.
Should be an interesting effort.
By the way, does anyone know if des-challenge@muffin.org is
alive? I haven't seen any messages from it in over a day and
majordomo is not responding to inquiries.
--
Mike Duvos $ PGP 2.6 Public Key available $
mpd@netcom.com $ via Finger. $
Return to February 1997
Return to ““Timothy C. May” <tcmay@got.net>”