Faster way to deescrow Clipper

Perry E. Metzger perry at imsi.com
Fri Jun 3 05:21:12 PDT 1994



David Koontz says:
> 
> >From: Matthew Ghio <ghio at cmu.edu>
> 
> >Or you could just steal someone else's LEAF, by keeping a copy of
> >it, and use that for spoofing.  Then you could have a valid IV
> >too...
> 
> Were you not to mind the adversary being able to get the session key, alice
> and bob could have an agreed upon modulous (XOR value) for the IV, that could
> be introduced by save and restore crypto state commands and xor.
> 
> (assuming that a mode were used behaving isosynchronous.)
> 
> Would law-enforcement carl know to ask national security bruce for help?

What the hell are you talking about? Indeed, what the hell have you
been talking about for days?






More information about the cypherpunks-legacy mailing list