-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Op dinsdag 4 september 2001 schreef Dierk Haasis:

> 1. Since all encrypted messages have to be decrypted to be read,
> every crypto scheme has weaknesses. With advanced computer power it
> is possible to create keys that are virtually unbreakable.

that's a tight corner to pull; *because* there is decryption *there
must be* weaknesses?

(are we off-topic yet?)

> 7. The other way is to get hold of the keys (especially the private
> one) *and* the passphrase of its owner.

well, that *and* was not a necessity; there was a flaw in the
definition of the private keyring (the file containing the private
keys), so that the passphrase was not necessary to sign messages.

see http://www.i.cz/en/pdf/openPGP_attack_ENGvktr.pdf for details
(cool math revealing the inner workings of PGP!)

Mrten.

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5i

iQA/AwUBO5TWhcxmXGfKa+lHEQIPEwCg5+XTfydZoJ2qns1cfSvzrYEs++4AoJem
SN9deVUHNtaA6KKiGBnhr5wG
=O8Sp
-----END PGP SIGNATURE-----


-- 
________________________________________________________
Archives   : http://tbudl.thebat.dutaint.com
Moderators : mailto:[EMAIL PROTECTED]
TBTech List: mailto:[EMAIL PROTECTED]
Unsubscribe: mailto:[EMAIL PROTECTED]
Latest Vers: 1.53d

Reply via email to