home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!gumby!wupost!udel!intercon!usenet
- From: amanda@intercon.com (Amanda Walker)
- Newsgroups: sci.crypt
- Subject: Re: Limits on the Use of Cryptography?
- Date: Mon, 14 Dec 1992 01:31:49 -0500
- Organization: InterCon Systems Corporation
- Lines: 17
- Distribution: world
- Message-ID: <9212140131.AA49035@chaos.intercon.com>
- References: <Bz886x.Jw5@ddsw1.mcs.com>
- Reply-To: amanda@intercon.com (Amanda Walker)
- NNTP-Posting-Host: chaos.intercon.com
- X-Newsreader: InterCon TCP/Connect II 1.1b22
-
- karl@ddsw1.mcs.com (Karl Denninger) writes:
- > Therefore, if the keys are not compromised you can, with certainty,
- > prove whether or not it was written by the individual in question.
-
- However, proving that a given key has *not* been compromised seems
- problematic. Any evidence would by its very nature have to be
- circumstantial...
-
-
-
- Amanda Walker
- InterCon Systems Corporation
-
-
-
-
-
-