home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky uk.misc:3253 alt.conspiracy:14762
- Path: sparky!uunet!inmos!fulcrum!warwick!pipex!ibmpcug!mantis!news
- From: mathew <mathew@mantis.co.uk>
- Newsgroups: uk.misc,alt.conspiracy
- Subject: Re: Camilla-gate
- Message-ID: <930128.170727.4n2.rusnews.w165w@mantis.co.uk>
- Date: Thu, 28 Jan 93 17:07:27 GMT
- References: <1993Jan22.161524.20250@visionware.co.uk> <JIM.93Jan27123206@hunter.cs.strath.ac.uk>
- Organization: Mantis Consultants, Cambridge. UK.
- X-Newsreader: rusnews v0.98
- Lines: 49
-
- jim@cs.strath.ac.uk (Jim Reid) writes:
- > In article <C1GBBw.I0p@demon.co.uk> pettsj@visigoth.demon.co.uk (James Petts)
- > writes:
- > Unlikely. Although it has never been proven, the RSA Public Key system
- > is though to be secure using a 1024 bit modulus for the calculation.
- >
- > And where can any of us buy encryption devices which use RSA (let
- > alone ones for real-time encoding/decoding of telephone
- > conversations)?
-
- There's plenty of software that uses it. PGP and RIPEM are the two obvious
- choices; they're both free and come with source code. For information about
- PGP, you can mail pgpinfo@mantis.co.uk. [ You probably know this, but some
- people reading this thread might not. ]
-
- > Remember too that exhaustive calculation like a complete search of
- > the key space is an unproductive way of breaking codes. RSA can be
- > broken by factoring huge numbers, if you want to wait until the end of
- > the universe. Other techniques such as analysis of the ciphertext (say
- > looking for repeating patterns) will yield insights into how the key
- > is constructed.
-
- PGP compresses the ciphertext before encrypting conventionally using the IDEA
- algorithm with a random session key. It then uses RSA on the session key.
- (RSA on the whole file would be rather slow.)
-
- I haven't looked at what RIPEM does yet.
-
- > Note too that a strong ciphersystem is in itself not secure. Care has
- > to be taken with key management. How often have UNIX systems been
- > broken into because users choose obvious passwords (keys) or make them
- > public?
-
- PGP and RIPEM both protect the private keys with passwords. PGP also has a
- facility to certify and verify keys by signing them with your private key.
- RIPEM instead relies on an official centralized key server and certification
- authority.
-
- > Secondly, RSA Inc has patented the
- > RSA algorithm in the USA. These patents don't apply in most of the
- > rest of the world because of differences in patent law. RSA Inc won't
- > export their product until they are able to protect it with overseas
- > patents.
-
- And a fat lot of good it does them. Still, I wonder if they're behind the
- TRIPs section of GATT?
-
-
- mathew
-