Attacking Clipper with timing info?

Jim Miller jim at bilbo.suite.com
Wed Dec 13 22:15:15 PST 1995



> >If it could be shown that Clipper chips require a fixed amount
> >of time/current to encode/decode traffic, then we could conclude
> >one of the following:
> >
> >(B1) The NSA knew about the issue and compensated for it.
> 

> Remember those carefully-chosen S-box numbers for DES
> and how, years later, how they just happened to turn out to
> be optimal for defending against the newly-discovered
> (in non-military circles) technique of differential
> cryptanalysis... :-) 

> 


That brings up an issue I occasionally think about...At what point does  
NSA's secrecy become more of a liability than an asset.  Should the NSA  
reveal flaws in crypto-systems in wide use here in the US to protect US  
companies and individuals from attack or should they remain quite so they  
can exploit them in the interests of national security?

Jim_Miller at suite.com






More information about the cypherpunks-legacy mailing list