From: Mike Duvos <mpd@netcom.com>
To: cypherpunks@toad.com
Message Hash: 95f8ac5acc9cab10bf02a4273722994b0825805ac0e84b681fae4f7b4a507d42
Message ID: <199702160656.WAA27608@toad.com>
Reply To: N/A
UTC Datetime: 1997-02-16 06:56:26 UTC
Raw Date: Sat, 15 Feb 1997 22:56:26 -0800 (PST)
From: Mike Duvos <mpd@netcom.com>
Date: Sat, 15 Feb 1997 22:56:26 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: (fwd) DES challenge organisation
Message-ID: <199702160656.WAA27608@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Adam Back <aba@dcs.ex.ac.uk> writes:
> How can this be enforced? The RSADSI DES challenge is open
> to all comers, and how do you prove that someone who finds
> the key found it through this group effort?
> I have a suspicion many people would be tempted to fill in
> the RSA challenge form and email it in themselves. $10,000
> is a fair amount of money.
Of course they will. If the unsearched portions of the keyspace
are published, you can just sit back until the odds go up and
then throw some CPU power at it. There is no obligation on the
part of the individual who finds the key to not claim the prize
personally.
The issues of random keyspace assignment to protect against
sabotage and centralized monolithic server vs autonomous client
have been debated on the "muffin" list, where I have been
lurking, but the people in charge seem to like explicit keyspace
partitioning and servers a lot.
Should be an interesting effort.
By the way, does anyone know if des-challenge@muffin.org is
alive? I haven't seen any messages from it in over a day and
majordomo is not responding to inquiries.
--
Mike Duvos $ PGP 2.6 Public Key available $
mpd@netcom.com $ via Finger. $
Return to February 1997
Return to “Mike Duvos <mpd@netcom.com>”
1997-02-16 (Sat, 15 Feb 1997 22:56:26 -0800 (PST)) - Re: (fwd) DES challenge organisation - Mike Duvos <mpd@netcom.com>