| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
Date: Tue, 22 Sep 1998 09:21:44 +0100
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: Greg Broiles <gbroiles@netbox.com>
CC: Nick Szabo <szabo@best.com>, cryptography@c2.net, doug@arcot.com,
cypherpunks@cyberpass.net
Reply-To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Greg Broiles wrote:
> I didn't understand the relationship between this scheme and Rivest's
> chaffing and winnowing which you note was cited as a reference in the SSC
> paper - would you (or someone else) mind explaining the connection? The
> closest I can get is thinking that there's a parallel between trying to
> guess which PIN in the SSC system is valid and which isn't, and the
> "winnowing" part of the Rivest protocol; but that doesn't seem like an
> especially meaningful or illuminating relationship. It looks like maybe a
> footnote was dropped, which would've tied the Rivest paper to a particular
> passage in the paper.
I like to mention that sometime ago there was a lot of discussions
in comp.security.pgp.discuss. My personal opinions on shaffing and
winnowing are summarized in
http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper3
M. K. Shen
| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |