From: Gordon Campbell Area: Public Key Encryption To: Zorch Frezberg 27 Jan 95 10:23:58 Subject: Can I Freq Pgp? UpdReq -----BEGIN PGP SIGNED MESSAGE----- On (25 Jan 95) Zorch Frezberg wrote to Gordon Campbell... ZF> Rightly so, I'm afraid. Now, only Nunavet is Canada...everything else ZF> is now in the US. It's actually Nunavut, but who's counting? ;-) ZF> Welcome...Home. Thhhbbbpppttttt! Cheers, .....G -----BEGIN PGP SIGNATURE----- Version: 2.6.i Comment: Help! Help! The paranoids are after me! iQCVAgUBLykQUIomCDt60qk9AQGJeAQAmTY9tULoBHvUpxU1ydvNEjWoYoOOZqR3 1wuaNA7SV9ZyK/LiinJpyetWRDMskTPbX/XgxzgtJ548bkGUQzU5WWm7N2VjJ66H yx5jMelDm7TffnnL7hFSIotBzLbmBpxPAn6d3RHOoLjdfgVyzQIrSXjtcBq4AWVR l5/1ihlSfo8= =4u4p -----END PGP SIGNATURE----- ... Genealogy = A DNA square-dance in the Thighlight Zone --- PPoint 1.90 # Origin: The Zone VI Image Workshop (1:249/121.3) 201434369420143436942014343694201434369420143436942014343694201 From: Chris Adams Area: Public Key Encryption To: Shawn McMahon 28 Jan 95 14:41:34 Subject: PGP News 2 UpdReq On (25 Jan 95) Shawn McMahon wrote to Chris Adams... SM> Bottom line; the best method the government, or any other attacker, could SM> use to crack something you've encrypted with IDEA would be to strap you in SM> a chair and bring out the rubber hose, and *NO* encryption is secure SM> against that. Unless they hit you so hard you forget the password. :-) Did you see my post earlier about a trojan password? (ie would reformat HD upon entry)? SM> The weak point in PGP is the RSA encryption, and that is more than secure SM> enough for now. 1024-bit keys probably won't be factorable for a few more SM> years, and 2048-bit keys may very well *NEVER* be factorable in your SM> lifetime. (This last is all IMO, but I'll be glad to dig out Schneier SM> again if you need an opinion from somebody qualified.) Nope. I'll take your word on it. Just curious. ... "Computers are unreliable, but humans are even more unreliable."-T. Gibb --- PPoint 1.88 # Origin: Help stamp out eavesdropping! - PGP (1:212/2001.5) 201434369420143436942014343694201434369420143436942014343694201 From: Chris Adams Area: Public Key Encryption To: David Chessler 28 Jan 95 14:43:12 Subject: Quotes as passphrase UpdReq On (26 Jan 95) David Chessler wrote to Chris Adams... CA>Which is why it would be neat if PGP had a FAKE password that, when >entered, would "accidently" reformat the harddrive after wiping the key! DC> That would be more appropriate for a program like SECDRV, SECDEV, or SFS DC> (or the forthcoming CryptDisk for the Mac), which set up an encrypted DC> partition. Okay, how about something which deletes the message AND the key? Would complicate their job a bit. DC> Of course, if you did that, they would spot the formating (overwriting a DC> disk takes a l-o-o-o-o-ng time), and then they might use more than just DC> rubber hoses. Not that kind of format, just wipe the key, file, and zap the fat. ... "After all, that's what 'omniscient' *means*, isn't it?" -Q --- PPoint 1.88 # Origin: Help stamp out eavesdropping! - PGP (1:212/2001.5) 201434369420143436942014343694201434369420143436942014343694201 From: Christopher Baker Area: Public Key Encryption To: Alan Pugh 29 Jan 95 00:10:42 Subject: that availability list you posted in parts [Was: Re: Can I Freq Pgp?]U -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 24 Jan 95, Alan Pugh was quoted as saying: AP> Origin: The Soapbox BBS - "Your Infotainment Specialist" (1:151/142) is that list of ftp and other sites where PGP may be found available in fileform at your address above? i asked this about a week ago and got no response. i meant to write those msgs you posted to a file but waited too long and they had scrolled off this end. if available as a file, please advise filename. thanks. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP 2.6.2 is LEGAL in Zone 1! So USE it! [grin] iQCVAwUBLysjVssQPBL4miT5AQFTqQQAiGKcgP4Q/sO5e9HEcMWNqW3WX0rVq3HG a/4uE5G6l/OQF/EOdNt3QmWyOfLG1pNzOBCJxZR9EUMDY6EtBcLHsJbrkbw/lVGY vJMRxUWhGi6CXxaFSF2AKyvUV46NtQzfkN0nIa6PYU33Gx84CKOQkD2lagl4aVVO n/kKDWYLmiw= =GCBs -----END PGP SIGNATURE----- --- GenMsg [0002] (cbak.rights@opus.global.org) # Origin: Rights On! for Privacy! It's a Right not a privilege! (1:374/14) 201434369420143436942014343694201434369420143436942014343694201 From: Shawn McMahon Area: Public Key Encryption To: Zorch Frezberg 29 Jan 95 14:39:58 Subject: SJI and IJ People. UpdReq Despite the stern warnings of the tribal elders, Zorch Frezberg said this to Jesus Rafael Lee: ZF> In a msg on , Jesus Rafael Lee of 1:273/203@fidonet.org writes: JRL>> Excuse me, this is an echomail conf., for the discussion of JRL>> PGP Public Key not a chit chatting area. Please JRL>> introduce yourself somewhere. ZF> Congratulations on becoming the new moderator, Jesus. ZF> Oh? Excuse me? You're *not* the moderator? Oh...well then ZF> who the hell are you trying to pretend to be ZF> one? Uhm, Zorch; what's wrong with this picture? :-) --- Sqed/32 0.98/r15029 # Origin: Void Where Prohibited/2 (1:19/34) 201434369420143436942014343694201434369420143436942014343694201 From: Shawn McMahon Area: Public Key Encryption To: John Schofield 29 Jan 95 14:44:20 Subject: PGP News 2 UpdReq Despite the stern warnings of the tribal elders, John Schofield said this to Chris Adams: JS> ways--such as bugging your computer, using Tempest equipment, or beating the JS> password out of you. I don't know about anybody else, but I personally would *RATHER* my passphrase be easy enough to crack that it's worth their while to do so instead of beating it out of me. --- Sqed/32 0.98/r15029 # Origin: Void Where Prohibited/2 (1:19/34) 201434369420143436942014343694201434369420143436942014343694201 From: Shawn McMahon Area: Public Key Encryption To: Chris Adams 29 Jan 95 15:17:18 Subject: PGP News 2 UpdReq Despite the stern warnings of the tribal elders, Chris Adams said this to Brian Mitchell: CA> I was exagerating. I'd just like, say, 16k bits, or 8 times more. It CA> would be slow, Chris, you seem to be under the impression that making the key twice as long makes it take twice as long to generate. This is in error. Remember, PGP has to generate two extremely large primes. It does this by generating random numbers, then testing them to see if they are prime. Each time you test a number, you have to go through a long session of Euclid's algorithm, as well as other tests. If you raise the size of the PGP key by 1 bit, you DOUBLE the size of the numbers that must be tested. BTW, they repeat the test a number of times for each candidate number. 8 times the key size will mean a hell of a lot more than 8 times as long to produce the keys. CA> but most of the public key stuff is used to encrypt the CA> IDEA session key, and IDEA carries the load, so it would CA> need to be augmented as well. Why do you think IDEA needs to be "augmented?" --- Sqed/32 0.98/r15029 # Origin: Void Where Prohibited/2 (1:19/34) 201434369420143436942014343694201434369420143436942014343694201