Faster way to deescrow Clipper

David Koontz koontzd at lrcs.loral.com
Thu Jun 2 20:14:00 PDT 1994



>From: Matthew Ghio <ghio at cmu.edu>

>Or you could just steal someone else's LEAF, by keeping a copy of it, and use
>that for spoofing.  Then you could have a valid IV too...

Were you not to mind the adversary being able to get the session key, alice
and bob could have an agreed upon modulous (XOR value) for the IV, that could
be introduced by save and restore crypto state commands and xor.

(assuming that a mode were used behaving isosynchronous.)

Would law-enforcement carl know to ask national security bruce for help?






More information about the cypherpunks-legacy mailing list