home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky sci.crypt:6593 alt.security.pgp:481 alt.security.ripem:81
- Newsgroups: sci.crypt,alt.security.pgp,alt.security.ripem
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!cs.utexas.edu!usc!sol.ctr.columbia.edu!The-Star.honeywell.com!umn.edu!csus.edu!netcom.com!strnlght
- From: strnlght@netcom.com (David Sternlight)
- Subject: Re: Zimmermann's responses to Sidelnikov's PGP critique
- Message-ID: <1993Jan10.000015.20757@netcom.com>
- Organization: Netcom - Online Communication Services (408 241-9760 guest)
- References: <1993Jan8.173701.8858@ncar.ucar.edu> <1993Jan9.172046.17709@colnet.cmhnet.org>
- Date: Sun, 10 Jan 1993 00:00:15 GMT
- Lines: 16
-
-
- Rob Stampfli suggests there may be a problem with unix systems'
- granularity in measuring the intervals between random characters
- typed as part of the PGP key generation process.
-
- I notice that one RIPEM public key in the public server file has its
- first 34 characters identical to my ripem public key. Perhaps this is
- related. It seems an unlikely coincidence, given that the two keys
- were generated by different individuals, apparently on different
- computers, and very likely at different clock times.
-
- David
- --
- David Sternlight
- RIPEM Public Key on server -- Consider it an envelope for your e-mail
-
-