Re: Faster way to deescrow Clipper
From: Matthew Ghio <ghio@cmu.edu>
Or you could just steal someone else's LEAF, by keeping a copy of it, and use that for spoofing. Then you could have a valid IV too...
Were you not to mind the adversary being able to get the session key, alice and bob could have an agreed upon modulous (XOR value) for the IV, that could be introduced by save and restore crypto state commands and xor. (assuming that a mode were used behaving isosynchronous.) Would law-enforcement carl know to ask national security bruce for help?
David Koontz says:
From: Matthew Ghio <ghio@cmu.edu>
Or you could just steal someone else's LEAF, by keeping a copy of it, and use that for spoofing. Then you could have a valid IV too...
Were you not to mind the adversary being able to get the session key, alice and bob could have an agreed upon modulous (XOR value) for the IV, that could be introduced by save and restore crypto state commands and xor.
(assuming that a mode were used behaving isosynchronous.)
Would law-enforcement carl know to ask national security bruce for help?
What the hell are you talking about? Indeed, what the hell have you been talking about for days?
participants (2)
-
koontzd@lrcs.loral.com -
Perry E. Metzger