up/home
Note:
A text list of all duplicate keys by short keyid listed on this page is
available in
duplicate_keyids
(signature).
Update:
Yet even more duplicates are found, esp. when using raw pubkey
packets to further disambiguate keys, even "identical" v2 and v3 keys or
v3 keys with different timestamps, for example.
- 0x66811C6E
- 0xC663621A
- 0x2BA4F30A
- 0x6C32639E
- 0x6017BDD7
- 0x57A96C80
- 0x19847A51
- 0x1FE70AC5
- 0x2A455E91
- 0x346B5095
- 0x5AC41CB9
- 0x76B635F5
- 0x7A507777
- 0x9536ADCD
- 0x968ED271
- 0xAEF29909
- 0xB2DA8875
- 0xBAD80261
- 0xC6333CAD
- 0xC67F6385
- 0xD205C5DD
- 0xD5EE7A01
- 0xF3F26C55
- 0x7FC625DA
- 0x9C2607DE
- 0x26C6E439
- 0xFA00F4C7
- 0x454208FC
- 0x7AA7A28B
- 0x04BF290C
- 0x406A3EF1
- 0xBEAE0747
- 0x891F9237
- 0x29640C53
- 0x5D0D8A0D
- 0xB7D1ABBF
- 0x6D4E678A
- 0x5DECF171
- 0xED7B1BFD
- 0x00613384
- 0x1FE70BE2
- 0xF0FF4CF9
- 0x1126FC80
- 0x3941360B
- 0xEDDA179D
- 0x24BBC063
- 0xE5E310C9
- 0xC8C7FE95
- 0x5D7C5207
- 0x475DD6E1
- 0x3CEAFBFD
- 0xE7207217
- 0x841D606D
- 0x000BF0C9
- 0x3EF0FE84
- 0x53BFC700
- 0x663D3B3F
- 0x41579935
- 0x84499C79
- 0x13692CD9
- 0xA5A2EDE5
- 0xC5334C52
- 0x7D0610B9
- 0xDB0E2EB5
- 0x981742E5
- 0xDA4741A2
- 0x7EA2E8EC
- 0xBF239321
- 0x2CD059FB
- 0x654BC86B
- 0xEA493162
- 0x5DB5C01B
- 0xC0BA470F
- 0x45402B60
- 0xF07BD1EC
- 0xF185844A
- 0x5A8BE3F5
- 0xE2F9E87C
- 0x43BDC7E8
- 0x299A88AC
- 0x69A97E35
- 0xD50B5187
- 0xB6AF2183
- 0xFAA50A35
- 0xF4102A7E
- 0x4B1B86E5
- 0xCD07DC2C
- 0x7543B782
- 0xE3B550F1
- 0xB6746995
- 0x4E54E46A
- 0xAFE49CA5
- 0x122976A5
- 0x0C38637F
- 0xD111E820
- 0x57190CE2
- 0x5BC8F225
- 0x41188545
- 0xD730FAAF
- 0x55EBF239
- 0x12037D41
- 0x084ACEF8
- 0xE6CB1A65
- 0x5A5AD16B
- 0x7B3FECA8
- 0x9E7A3BCB
- 0x6B481AB2
- 0x7688AA16
- 0x4B8FFF5D
- 0x639A29E9
- 0xE6856DE5
- 0x049E669F
- 0xEF0F7765
- 0x99659458
- 0x391CF57F
- 0xDD9E986D
- 0xA9C324A5
- 0xB59034AD
- 0x0DCB908F
- 0x0D090C01
- 0xBC1AECBD
- 0xD642143E
- 0xB1BB3676
- 0x1F185309
- 0x878AB4DB
- 0x34B3EBB4
- 0x85E5A62A
- 0xB0B12CAB
- 0x941DCFCD
- 0xEABF58FA
- 0x9C62C238
- 0xE320CC89
- 0xACA06F77
- 0xFBB7C0A9
- 0x8CFC045E
- 0x64D4C5A3
- 0xF49FF063
- 0xB8170D80
- 0x77FCAE8E
- 0xA47C2E15
- 0x95063EB5
- 0x5FCD9D69
- 0xD6CE34D6
- 0x97C07C3C
- 0xA6DE1F89
- 0xF8CA5F37
- 0x60E1FFD3
- 0x7E334162
- 0xC1D3F395
- 0xE8344447
- 0xDC6F4AF5
- 0x463C5060
- 0x9D23D715
- 0xB7F26B77
- 0x9B453F02
- 0x2EE0D255
- 0x0821B291
- 0xD268335B
- 0x72F3AD39
- 0x8038ADD1
- 0x90729399
- 0x73EB2931
- 0x6C2153F1
- 0x11DF99ED
- 0x7E25665D
- 0x528F312D
- 0x1BA0361F
- 0x4390A2D1
- 0x575C4F0D
- 0x5E8F6781
- 0xB163261F
- 0x47FB37F5
- 0x1B0F57CD
- 0x6AF50661
- 0xEE309FD9
- 0x88CEF15D
- 0x5D986FE5
- 0x87BF2339
- 0x26168E25
- 0xC7BBA289
- 0x9E2B56D1
- 0x9EA91711
- 0x2ED49129
- 0xFF222F51
- 0x55ABC0C1
- 0x11F8CD55
- 0x3EE96E5D
- 0x24CB26B9
Update:
In the 2002-08-25 keydump of
keyserver.kjsl.com,
the following 8 new keys with duplicate short keyids were found,
out of 1,739,162 keys:
- 0x1B389331 (neither are v4)
- 0x2A82FD06 (both are v4)
- 0x2E478D2F (both are v4)
- 0x4FA75F05 (neither are v4)
- 0x596B51FD (one v4)
- 0x85F53CA8 (both are v4)
- 0x9C07D7E1 (one v4)
- 0xA8CC5B8D (one v4)
Also, a bug in pks previously prevented some duplicates from being stored
properly. Such keys include:
- 0x0BFA074E (both are v4)
- 0x1A25D86C (both are v4)
- 0x1CE774F5 (both are v4)
- 0x1EFFBA41 (both are v4)
- 0x1F79D1C6 (both are v4)
- 0x2331D852 (both are v4)
- 0x27EAC459 (both are v4)
- 0x2904A433 (both are v4)
- 0x2CC326B2 (both are v4)
- 0x2D0B163B (both are v4)
- 0x2E0EFE48 (both are v4)
- 0x2EB2FE5E (both are v4)
- 0x32C6C7E9 (both are v4)
- 0x3791AA27 (both are v4)
- 0x431C9CAF (both are v4)
- 0x444FCABD (both are v4)
- 0x63DB2AC5 (both are v4)
- 0x67CFC0D4 (both are v4)
- 0x6C6481CA (both are v4) (FreeBSD committer)
- 0x6E3A63C3 (both are v4)
- 0x6F0747C6 (both are v4)
- 0x6FD1C1C4 (both are v4)
- 0x728E84AD (both are v4)
- 0x758C6BC5 (both are v4)
- 0x763C940C (both are v4)
- 0x77E19C76 (both are v4)
- 0x798CF548 (both are v4)
- 0x7A4A5F53 (both are v4)
- 0x7D4EC548 (both are v4)
- 0x7DDAB28F (both are v4)
- 0x7FE905CC (both are v4)
- 0x8162F90D (both are v4)
- 0x88ED08C5 (both are v4)
- 0x89F0B16D (both are v4)
- 0x8D315505 (both are v4)
- 0x8DDFBFE6 (both are v4)
- 0x92987D92 (both are v4)
- 0x9ACE8476 (both are v4)
- 0x9B097544 (both are v4)
- 0x9D41A5E0 (both are v4)
- 0xA127B880 (both are v4)
- 0xA56E15A3 (both are v4)
- 0xA8B35D11 (both are v4)
- 0xAE433DE3 (both are v4)
- 0xB470FE8A (both are v4)
- 0xB62F43F9 (both are v4)
- 0xB6995831 (both are v4)
- 0xBB35C66D (both are v4)
- 0xBD81AE64 (both are v4)
- 0xC5C76C81 (both are v4)
- 0xD596E7D4 (both are v4)
- 0xD669140C (both are v4)
- 0xDA3E21F5 (both are v4)
- 0xDB127C12 (both are v4)
- 0xDB417E40 (both are v4)
- 0xDE4A83AE (both are v4)
- 0xDEADBEEF (new v4)
- 0xDF3E8ED0 (both are v4)
- 0xE7F1ECA9 (both are v4)
- 0xEB59D2E5 (both are v4)
- 0xEB73A58F (both are v4)
- 0xF99B11F2 (both are v4)
- 0xFA6176B4 (both are v4)
- 0xFAEBD5FC (both are v4) (one is PRZ's, the other is fake)
- 0xFE9F8A51 (both are v4)
This brings the number of duplicate short keyids on v4 keys to 70.
Given 152 duplicate short keyids in total, 46.1% are v4 keys.
In the 2002-02-01 keydump of
pgp.cc.gatech.edu,
there are 5 duplicate long (64 bit)
keyids and 81 duplicate short (32 bit) keyids, out of 1,623,342 keys.
This
previous survey
from 1999-07-09 can be used for a comparison. The duplicates by long keyid all
appear to be two versions of the same key (all are pre-v4 RSA with
slightly-mangled moduli in the bits before the last 64 (the keyid)):
- 0x6B2B5E51E879DAF5 (0xE879DAF5, also #73 below)
- 0xA88984546775FEF5 (0x6775FEF5, also #26 below)
- 0xBC3A4EB1DE0E525D (0xDE0E525D, also #69 below)
- 0xD1FAB1B9D6DC8A3D (0xD6DC8A3D, also #65 below)
- 0xF8CC5575CFA87201 (0xCFA87201, also #60 below)
The duplicates by short keyid (note that there are two 0xDEADBEEF duplicates):
- 0x00000001 (neither are v4)
- 0x0332405D (one v4)
- 0x0A0F1541 (one v4)
- 0x0A503E41 (one v4)
- 0x1493A535 (one v4)
- 0x19980101 (same key?)
- 0x1FD5B72E (both are v4)
- 0x225CA009 (same key?)
- 0x2359D67D (one v4)
- 0x24CB26B9 (one v4)
- 0x266B52ED (one v4)
- 0x2724373D (neither are v4)
- 0x277A5385 (one v4)
- 0x38A4A841 (one v4)
- 0x3C777CC5 (same key?)
- 0x3D2A7407 (one v4)
- 0x43B726C5 (one v4)
- 0x46E09E1D (one v4)
- 0x4781CE09 (neither are v4)
- 0x508728F1 (one v4)
- 0x5819CF01 (one v4)
- 0x608BB3C9 (one v4)
- 0x621FFE5D (one v4)
- 0x6291B7B3 (one v4)
- 0x63037F7F (one v4)
- 0x6775FEF5 (same key?, same long keyid)
- 0x679A7B31 (one v4)
- 0x6C6133BD (one v4)
- 0x6D20B645 (one v4)
- 0x6D3C7479 (one v4)
- 0x705A7DBF (one v4)
- 0x72CADA85 (neither are v4)
- 0x740F69ED (one v4)
- 0x7BFE3FC1 (one v4)
- 0x809E90F5 (one v4)
- 0x838E25BF (one v4)
- 0x8626AC55 (one v4)
- 0x880F1F45 (neither are v4)
- 0x8B8D1E9D (one v4)
- 0x8D56CB67 (one v4)
- 0x8D7EAD6B (neither are v4)
- 0x8D89BF15 (neither are v4)
- 0x903C18AE (one v4)
- 0x9BCCB299 (same key?)
- 0x9BF76715 (one v4)
- 0x9FCB8F11 (one v4)
- 0xA2B9A085 (one v4)
- 0xA41D767D (one v4)
- 0xA8BF6085 (one v4)
- 0xAA2D3D51 (neither are v4)
- 0xAE7472A5 (same key?)
- 0xB059FF01 (one v4)
- 0xB20D9A65 (neither are v4)
- 0xB44078FB (one v4)
- 0xB7373685 (one v4)
- 0xB7683091 (neither are v4)
- 0xBE283571 (one v4)
- 0xC30BC6E5 (one v4)
- 0xCD3891F1 (one v4)
- 0xCFA87201 (same key?, same long keyid)
- 0xD1A0E42D (one v4)
- 0xD4135633 (one v4)
- 0xD58CB69D (one v4)
- 0xD5C96F11 (one v4)
- 0xD6DC8A3D (same key?, same long keyid)
- 0xD8C8F3ED (same key?)
- 0xD923B439 (one v4)
- 0xDCD2E949 (both are v4)
- 0xDE0E525D (same key?, same long keyid)
- 0xDEADBEEF (one v4, two !v4)
- 0xDEADBEEF
- 0xE018A303 (one v4)
- 0xE879DAF5 (same key?, same long keyid)
- 0xEA1D232D (neither are v4)
- 0xEE6C909D (one v4)
- 0xEE841041 (one v4)
- 0xF22A0263 (one v4)
- 0xFADFCD89 (one v4)
- 0xFB159E0D (one v4)
- 0xFCEF82E1 (one v4)
- 0xFD04D2C9 (one v4)
$Date: 2004/01/06 22:41:36 $