A number of SSL-enabled applications use precomputed public DH parameters (p and g) generated for use in the SKIP protocol. The original page appears to be off the air; here's an archived version:
http://web.archive.org/web/20011212141438/http://www.skip-vpn.org/spec/numbers.html#params Question: Are these safe for use as precomputed parameters for generating OpenPGP ElGamal keys? --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]