home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.compression
- Path: sparky!uunet!mcsun!news.funet.fi!hydra!klaava!huuskone
- From: huuskone@klaava.Helsinki.FI (Taneli Huuskonen)
- Subject: Re: How do AV Codes Work? (PKZIP)
- Message-ID: <1992Dec14.140229.6488@klaava.Helsinki.FI>
- Organization: University of Helsinki
- References: <usgcjsx.723851067@gsusgi1.gsu.edu> <1992Dec9.223633.24425@leland.Stanford.EDU> <bontchev.724072736@fbihh> <1992Dec12.042955.18961@leland.Stanford.EDU>
- Date: Mon, 14 Dec 1992 14:02:29 GMT
- Lines: 22
-
- In <1992Dec12.042955.18961@leland.Stanford.EDU> kocherp@leland.Stanford.EDU (Paul Carl Kocher) writes:
-
- >[...] Possibly some public-key system that has
- >been broken could be used successfully, since very little plaintext (and
- >essentially no chosen plaintext) would be available to crackers?
-
- Note that if you have a public-key encryption system, the attacker can
- produce arbitrary amounts of cryptotext from chosen plaintext -- thus
- the amount of text actually encrypted is irrelevant.
-
- On the other hand, I've personally devised a public-key signature system
- whose largish public keys can be used for a limited number of signatures
- only, or the security will be compromised. I don't know if there are
- any other such systems. Possibly my system can be cracked anyway; I
- haven't discussed the algorithm with any expert. At any rate, my system
- shouldn't clash with any stupid crypto export laws, as it can't be used
- for encryption.
- --
- Taneli Huuskonen | finger huuskonen@cc.helsinki.fi | Garanteely speling
- -----------------|-------------------------------------| & grammer errur free
- Did I claim | S e va'gy tala'n me'g jobban boldogi't |---------------------
- something? | Mint ha ott volne'k, ahol lenni va'gyok. -Peto"fi Sa'ndor
-