home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!moe.ksu.ksu.edu!engr.uark.edu!mbox.ualr.edu!grapevine!john.eichler
- Newsgroups: sci.crypt
- Subject: Re: Demons and Ogres
- Message-ID: <1538.517.uupcb@grapevine.lrk.ar.us>
- From: john.eichler@grapevine.lrk.ar.us (John Eichler)
- Date: 21 Nov 92 06:21:00 GMT
- Reply-To: john.eichler@grapevine.lrk.ar.us (John Eichler)
- Distribution: world
- Organization: The GrapeVine BBS *** N. Little Rock, AR *** (501) 753-8121
- Lines: 19
-
-
- >In <1992Nov17.065526.15487@cactus.org> Terry Ritter states:
-
- > Nonsense. My proposal is that, given the ciphertext, the user
- > would be required to make it plain. This means that there would
- > be a responsibility to log old *keys*, not conversations.
-
- I must be missing something here. I agree with what Terry says but if I
- were to have a copy of a plaintext message to Terry and were to encrypt it
- with his public key, just how would I go about making such plaintext plain
- again WITHOUT his secret key even if I wanted to for any purpose. In other
- words, even if I maintained a copy of the original plaintext message, how
- could I prove it was what was encrypted using, for example, PGP.
-
- Is this a problem? And if so, what is the best way to approach it.
-
- ---
- . SM 1.06 ----- . Email: john.eichler@grapevine.lrk.ar.us
-
-