On Tue, 28 Apr 1998, Eric Young wrote:
> > Is there something in the algorithm that allows the program to detect that
> > it got the right key, or do you look for something that resembles English
>
> The protocol has its own integrity chech, which is encrypted, so if the
It's also worth pointing out that if you're brute-forcing a public key,
most such algorithms are based for security on number theory problems like
factoring or discrete logarithms. Verifying that you have the correct
answer in such a situation is a trivial bit of mathematics.
"Let me lose so beautifully http://www.islandnet.com/~mskala/
Let me lick the dew from the money tree Matthew Skala
Have the moms of the world all care about me Ansuz BBS
At suppertime" - Odds (250) 642-7820
+-------------------------------------------------------------------------+
| Administrative requests should be sent to [EMAIL PROTECTED] |
| List service provided by Open Software Associates, http://www.osa.com/ |
+-------------------------------------------------------------------------+