On Tue, 28 Apr 1998, Eric Young wrote:
> > Is there something in the algorithm that allows the program to detect that
> > it got the right key, or do you look for something that resembles English
> 
> The protocol has its own integrity chech, which is encrypted, so if the

It's also worth pointing out that if you're brute-forcing a public key,
most such algorithms are based for security on number theory problems like
factoring or discrete logarithms.  Verifying that you have the correct
answer in such a situation is a trivial bit of mathematics.

"Let me lose so beautifully               http://www.islandnet.com/~mskala/
 Let me lick the dew from the money tree           Matthew Skala
 Have the moms of the world all care about me        Ansuz BBS
 At suppertime"                        - Odds     (250) 642-7820

+-------------------------------------------------------------------------+
| Administrative requests should be sent to [EMAIL PROTECTED] |
| List service provided by Open Software Associates, http://www.osa.com/  |
+-------------------------------------------------------------------------+

Reply via email to