Re: Slicing and dicing

Karl Fox <karl@Ascend.COM> Fri, 12 September 1997 12:40 UTC

Received: (from majordom@localhost) by portal.ex.tis.com (8.8.2/8.8.2) id IAA06670 for ipsec-outgoing; Fri, 12 Sep 1997 08:40:05 -0400 (EDT)
Date: Fri, 12 Sep 1997 05:48:40 -0700
Message-Id: <199709121248.FAA08785@gump.eng.ascend.com>
From: Karl Fox <karl@Ascend.COM>
To: Phil Karn <karn@qualcomm.com>
Cc: rodney@sabletech.com, ipsec@tis.com
Subject: Re: Slicing and dicing
In-Reply-To: <m0x9OSt-000HUqC@laptop.ka9q.ampr.org>
References: <199709091811.LAA20489@gump.eng.ascend.com> <m0x9OSt-000HUqC@laptop.ka9q.ampr.org>
Reply-To: Karl Fox <karl@Ascend.COM>
Organization: Ascend Communications
Sender: owner-ipsec@ex.tis.com
Precedence: bulk

Phil Karn writes:
> How likely are we to generate a weak key by random accident? Is it
> worth worrying about?

Probably not.  I'd just like to see the documents agree.
-- 
Karl Fox, servant of God, employee of Ascend Communications
655 Metro Place South, Suite 370, Dublin, Ohio  43017   +1 614 760 4041