Smart card attacks vs. clipper?

Matthew J. Miszewski mjmiski at execpc.com
Mon Nov 25 14:28:28 PST 1996


(snip)
> Seems like it's a bit of a different story, since in the Clipper's
> case the algorithm is (ostensibly) unknown, but I'm just curious as
> to whether there is some compromise of its security-through-obscurity.

Actually, in a more recent attack to be published at USENIX (if i 
remember correctly) the attack being performed can also be utilized 
to help determine unknown algorithms.  I will try to dig up the 
reference (unless someone gets to it first).

Matt

> -- 
> ______c_________________________________________________________________
> Mike M Nally * IBM % Tivoli * Austin TX  * How quickly we forget that
> mailto:m5 at tivoli.com mailto:m101 at io.com  * "deer processing" and "data
> http://www.io.com/~m101/                 * processing" are different!
> 
> 






More information about the cypherpunks-legacy mailing list