Vanity Key@@sig

Melvin Carvalho melvincarvalho at gmail.com
Mon Apr 8 22:35:16 CEST 2013


On 3 April 2013 19:39, Andreas Mattheiss <please.post at publicly.invalid>wrote:

> Well, uhm, if it's really important to you:
>
> The concept of hashes/fingerprints/etc. is that it is (next to) impossible
> to find an entity-to-be-hashed (here a key) if you specify the hash. In
> fact a hash function that allows you to do this would be cryptographically
> frowned upon.
>
> However, there is nothing that stops you from generation a gazillon of
> keys, until you - by chance - get one with a hash you like.
>
> This brute force approach is what is behind bitcoin mining or hashcashing
> email messages - the latter, sadly, an idea ignored by the general public.
>

Yes, tho I think hashcash is used sometimes in spam assassin


>
> Regards
> Andreas
>
> --
> LISTER: Me. No another one for you. Rear Admiral Lieutenant General Rimmer.
>
>
>
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20130408/b0c763f1/attachment.html>


More information about the Gnupg-users mailing list