Randomness

Dean, James Jdean at lsuhsc.edu
Thu May 8 08:01:57 EDT 2003


The standard way to generate a UUID is to use the date/time and MAC, as
described
in http://www.globecom.net/ietf/draft/draft-kindel-uuid-uri-00.txt.  After
the
UUID embedded in its Word document was used to trace the Melissa virus,
there
was a controversy about Word documents being traceable.  Shortly thereafter,
Microsoft modified their UuidCreate function to create a UUID "that cannot
be
traced to the ethernet/token ring address of the computer on which it was
generated". It'd be interesting to look at the source code for CreateUuid
and
see if the MAC is absent, hashed, or encrypted.


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list