From: Adam Back <aba@dcs.ex.ac.uk>
To: cypherpunks@cyberpass.net
Message Hash: 143ac3c02006f9bff24d780c59410bdabc07f0f37803969f13c930ab02d3cb4c
Message ID: <199710212334.AAA02249@server.test.net>
Reply To: N/A
UTC Datetime: 1997-10-22 00:07:42 UTC
Raw Date: Wed, 22 Oct 1997 08:07:42 +0800
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 22 Oct 1997 08:07:42 +0800
To: cypherpunks@cyberpass.net
Subject: wanted dead or alive: pgp5.5 key pair
Message-ID: <199710212334.AAA02249@server.test.net>
MIME-Version: 1.0
Content-Type: text/plain
Could some kind soul who has downloaded pgp5.5 for business (I think
it is available in the US from www.pgp.com) create a key with a CMR
key extension.
I guess this means generating two keys:
XYZ Corp recovery key <snoopy@xyz.com>
and then:
XYZ Corp Sales <sales@xyz.com>
with the sales person's key set up to have a strict requirement to
encrypt to the XYZ "message recovery" key.
Could this kind soul then mail me, (or post here I guess would be even
more useful) both the private and public keys of both of them.
Enciphering minds want to find out how pgp5.0 reacts to this key :-)
(The question is really does pgp5.0 encrypt to the CMR key).
(btw for the curious as to why my previous message was had a date of
22nd Feb ... I had to set my clock back to get pgp5.0 beta to function
as the one I have had expired, and I forgot to set the clock forward
again).
Adam
--
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`
Return to October 1997
Return to “Tim May <tcmay@got.net>”