On 3 April 2013 19:39, Andreas Mattheiss wrote:
> Well, uhm, if it's really important to you:
>
> The concept of hashes/fingerprints/etc. is that it is (next to) impossible
> to find an entity-to-be-hashed (here a key) if you specify the hash. In
> fact a hash function that allows you to do this would be cryptographically
> frowned upon.
>
> However, there is nothing that stops you from generation a gazillon of
> keys, until you - by chance - get one with a hash you like.
>
> This brute force approach is what is behind bitcoin mining or hashcashing
> email messages - the latter, sadly, an idea ignored by the general public.
>
Yes, tho I think hashcash is used sometimes in spam assassin
>
> Regards
> Andreas
>
> --
> LISTER: Me. No another one for you. Rear Admiral Lieutenant General Rimmer.
>
>
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users