From: “Robert A. Costner” <pooh@efga.org>
To: Adam Back <aba@dcs.ex.ac.uk>
Message Hash: a2531c4a83fb81ffa65a95ba87a0a4fefdb2e31587b20260f7ddde42b62e0ce8
Message ID: <3.0.2.32.19970608190515.007152dc@mail.atl.bellsouth.net>
Reply To: <199706082051.VAA05211@server.test.net>
UTC Datetime: 1997-06-08 23:19:56 UTC
Raw Date: Mon, 9 Jun 1997 07:19:56 +0800
From: "Robert A. Costner" <pooh@efga.org>
Date: Mon, 9 Jun 1997 07:19:56 +0800
To: Adam Back <aba@dcs.ex.ac.uk>
Subject: PGP Key generation
In-Reply-To: <199706082051.VAA05211@server.test.net>
Message-ID: <3.0.2.32.19970608190515.007152dc@mail.atl.bellsouth.net>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
I have a question for any of you that may know the answer. This is for a
paper I am giving to the Social Security Administration on Tuesday, so I
would appreciate any answer I get.
If I generate a personal PGP keypair on some machine it takes a specific
period of time to do the intensive calculations, let's assume ten minutes for
this example. If I needed 10,000 such individual keyspairs for a unspecified
authentication attack, does this have to take 10,000 times 10 minutes (over
two months with this CPU), or is there a faster way to generate a large
number of keypairs to appear to be a large number of people.
The larger question is since 10,000 unique written signatures seems to
indicate that 10,000 unique individuals exist, would 10,000 unique PGP
signatures also seem to indicate that these are not from the same person?
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQBVAwUBM5s6qEGpGhRXg5NZAQG0ywIAwM3EOYMTvpxZEJqpsEqGvdAGA35Tjv0I
ODzAbs/aoSQ6KWMwmw306GOvfSCGBQDgw5QJ/0ENxFwb+1OFkcA2BQ==
=hVvI
-----END PGP SIGNATURE-----
-- Robert Costner Phone: (770) 512-8746
Electronic Frontiers Georgia mailto:pooh@efga.org
http://www.efga.org/ run PGP 5.0 for my public key
Return to June 1997
Return to ““Robert A. Costner” <pooh@efga.org>”