
17 Dec
2003
17 Dec
'03
11:17 p.m.
(snip)
Seems like it's a bit of a different story, since in the Clipper's case the algorithm is (ostensibly) unknown, but I'm just curious as to whether there is some compromise of its security-through-obscurity.
Actually, in a more recent attack to be published at USENIX (if i remember correctly) the attack being performed can also be utilized to help determine unknown algorithms. I will try to dig up the reference (unless someone gets to it first). Matt
-- ______c_________________________________________________________________ Mike M Nally * IBM % Tivoli * Austin TX * How quickly we forget that mailto:m5@tivoli.com mailto:m101@io.com * "deer processing" and "data http://www.io.com/~m101/ * processing" are different!