[103210] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: ArcotSign (was Re: Does security depend on hardware?)

daemon@ATHENA.MIT.EDU (Mok-Kong Shen)
Tue Sep 22 04:25:42 1998

Date: Tue, 22 Sep 1998 09:21:44 +0100
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: Greg Broiles <gbroiles@netbox.com>
CC: Nick Szabo <szabo@best.com>, cryptography@c2.net, doug@arcot.com,
        cypherpunks@cyberpass.net
Reply-To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>

Greg Broiles wrote:

> I didn't understand the relationship between this scheme and Rivest's
> chaffing and winnowing which you note was cited as a reference in the SSC
> paper - would you (or someone else) mind explaining the connection? The
> closest I can get is thinking that there's a parallel between trying to
> guess which PIN in the SSC system is valid and which isn't, and the
> "winnowing" part of the Rivest protocol; but that doesn't seem like an
> especially meaningful or illuminating relationship. It looks like maybe a
> footnote was dropped, which would've tied the Rivest paper to a particular
> passage in the paper.

I like to mention that sometime ago there was a lot of discussions
in comp.security.pgp.discuss. My personal opinions on shaffing and 
winnowing are summarized in

    http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper3

M. K. Shen


home help back first fref pref prev next nref lref last post