From: Adam Back <aba@dcs.ex.ac.uk>
To: cypherpunks@cyberpass.net
Message Hash: f4a0181a5252c255d6924177c935690c8718cb59fbecf5cf1637621e23eb3a83
Message ID: <199801191148.LAA00798@server.eternity.org>
Reply To: <iV7iJe30w165w@bwalk.dm.com>
UTC Datetime: 1998-01-19 20:32:34 UTC
Raw Date: Tue, 20 Jan 1998 04:32:34 +0800
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Tue, 20 Jan 1998 04:32:34 +0800
To: cypherpunks@cyberpass.net
Subject: Re: proving that one knows how to break RSA
In-Reply-To: <iV7iJe30w165w@bwalk.dm.com>
Message-ID: <199801191148.LAA00798@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain
Dimitri Vulis <dlv@bwalk.dm.com> writes:
> I believe Bill [Payne] is genuinely afraid that if he published his
> algorithm, then he'll be killed. I don't know enough to judge how
> realistic his fear is.
There are a few other scenarios which suggest he may be at risk even
if he doesn't publish. Firstly if we argue on the basis that he does
have a fast algorithm:
- if the NSA thinks they already know the algorithm he has discovered,
they may kill him anyway to prevent disclosure to others
- the NSA may kidnap him, inject him with various truth drugs, and
generally torture the information from him, and then kill him
Insurance in the form of a disclosure procedure in the event of his
premature death will reduce his risk of being killed.
Secondly if we argue on the basis that Bill doesn't have a fast
factoring algorithm, or is mistaken about the complexity of his
algorith:
- if the NSA thinks his claim credible they may again kidnap him and
attempt to extract this algorithm from him. They may then kill him
to prevent him talking about them torturing him if he reveals an
algorithm, or appears not to have an algorithm
He appears to be in greater risk if falsely claiming he has a fast
algorithm if his claim appears credible to the NSA -- his insurance in
the form of a fall back public disclosure procedure in event of his
premature death no longer helps him.
In general it seems generally a dangerous claim to make.
> I've been involved in serious discussions of assassinations over
> smaller amounts of money than is at stake here. He displays great
> courage by saying anything at all at this point.
If it is true, it is a big deal indeed.
> Yes, it would be most interesting/impressive if Bill demonstrated his
> ability to factor using some of the published chalenges.
Another target Bill might be amused to factor if we can obtain it is
the NSA's public key embedded in lotus notes implementations. Should
fit in with his interest in showing incompetence on the part of the
NSA.
Adam
--
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`
Return to January 1998
Return to ““wabe” <wabe@smart.net>”