-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
One of the features of PGP is that when you encrypt a message, you
can specify any number of recipients (unique public keys) who can
read the message. The message is encrypted with a random session key
using a symmetric algorithm such as CAST or IDEA. The message header
contains the session key encrypted with each public key specified,
and any matching private key can be used to decrypt the session key
from the header, and thus the entire message. The Outlook/Eudora
plugins automatically attempt to match the addresses of recipients of
outgoing messages to email addresses on keys in your keyring file.
One of the keys specified can be your own; PGP 6.x can default to
encrypting all messages with your key.
Jonathan Wienke
- -----Original Message-----
From: David Honig [mailto:[EMAIL PROTECTED]]
Sent: Monday, May 14, 2001 7:27 PM
To: Robin Lee Powell; CypherPunks
Subject: Re: Shared-Secret similar algorithm
At 02:28 PM 5/14/01 -0700, Robin Lee Powell wrote:
>
>What the _hell_ is the point of a shared secret scheme where you can
>reconstruct the secret with only one key??
>
Interesting question. There have been times when I've sent
email and not encrypted it to myself, and later wanted to
read it, but not wanted to bother the recipient.
If such a beast were possible then it would be useful.
Its not clear to me that its impossible
Cipher=PK(pub,priv,Plaintext)
Plaintext=PK^{-1}(pub,priv,Cipher)
and
Plaintext=Foo(priv,Cipher)
but I don't see how it would work (which means nothing.)
Is there an obvious proof that it couldn't exist?
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>
iQA/AwUBOwC4Dxj6oMyeDxZoEQIAIwCfX0T3X5QS9QSBgepqLL0c55DwubwAoO3M
mhENi/MvooAR2Br2+5GlJROs
=K6NJ
-----END PGP SIGNATURE-----