[13220] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: Randomness

daemon@ATHENA.MIT.EDU (Dean, James)
Thu May 8 08:46:51 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Dean, James" <Jdean@lsuhsc.edu>
To: cryptography@metzdowd.com
Date: Thu, 8 May 2003 07:01:57 -0500 

The standard way to generate a UUID is to use the date/time and MAC, as
described
in http://www.globecom.net/ietf/draft/draft-kindel-uuid-uri-00.txt.  After
the
UUID embedded in its Word document was used to trace the Melissa virus,
there
was a controversy about Word documents being traceable.  Shortly thereafter,
Microsoft modified their UuidCreate function to create a UUID "that cannot
be
traced to the ethernet/token ring address of the computer on which it was
generated". It'd be interesting to look at the source code for CreateUuid
and
see if the MAC is absent, hashed, or encrypted.


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post