Re: Time Keys, Some Secure Ideas (by Alias: Jay Hyden)
17 Dec
2003
17 Dec
'03
11:17 p.m.
Jay - you wrote:
>> Time Keys, Some Secure Ideas << The weakest attack on a time key based system is to spoof the computer that keeps track of time into releasing encryption keys i.e. change the clock.
No, the weakest link is that you have to trust the person _running_ the time key system. Spoofing the clock only matters to a system you trust. Even a system running on a satellite isn't trustable unless you're running it yourself; your good friend and business partner who launched it may have put in a backdoor because the KGB threatened to kill his grandmother if he didn't. #--- # Bill Stewart, Freelance Information Architect, stewarts@ix.netcom.com # Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281 #---
8180
Age (days ago)
8180
Last active (days ago)
0 comments
1 participants
participants (1)
-
Bill Stewart