On Friday, April 04, 2003 1:02 AM, J C Lawrence [SMTP:claw(_at_)kanga(_dot_)nu]
wrote:
8<...>8
Note that the Porkhash proposal doesn't use signatures or keys, just an
MD5 hash of items with a secret. Under the porkhash proposal anybody
wishing to verify a hash has to contact a system which possesses the
secret, for re-computation of the hash to see if it matches. This
requires the secret to:
a) be on an exposed system.
b) be on a system which can be systematically explored and tested in
attempt to deduce the hash.
Neither are optimal conditions.
I see, I have to admit I had only been following this thread in a cursory
manner. I take your points.
Thanks.
-e
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg