Smart card attacks vs. clipper?
Matthew J. Miszewski
mjmiski at execpc.com
Mon Nov 25 14:28:28 PST 1996
(snip)
> Seems like it's a bit of a different story, since in the Clipper's
> case the algorithm is (ostensibly) unknown, but I'm just curious as
> to whether there is some compromise of its security-through-obscurity.
Actually, in a more recent attack to be published at USENIX (if i
remember correctly) the attack being performed can also be utilized
to help determine unknown algorithms. I will try to dig up the
reference (unless someone gets to it first).
Matt
> --
> ______c_________________________________________________________________
> Mike M Nally * IBM % Tivoli * Austin TX * How quickly we forget that
> mailto:m5 at tivoli.com mailto:m101 at io.com * "deer processing" and "data
> http://www.io.com/~m101/ * processing" are different!
>
>
More information about the cypherpunks-legacy
mailing list