[103228] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: ArcotSign (was Re: Does security depend on hardware?)

daemon@ATHENA.MIT.EDU (Mok-Kong Shen)
Tue Sep 22 08:40:56 1998

Date: Tue, 22 Sep 1998 14:28:31 +0100
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: Bruce Schneier <schneier@counterpane.com>
CC: cryptography@c2.net, cypherpunks@Algebra.COM, coderpunks@toad.com
Reply-To: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>

Bruce Schneier wrote:
> 
> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote:

> >If the 'mathematical magic' is not to be kept secret (as in principle
> >shouldn't for all crypto algorithms) then presumably one could
> >attack through brute forcing the 'remembered secrect', I guess.
> 
> Yes, but only through an on-line protocol.   And if the server has some
> kind of "turn the user off after ten bad password guesses," then the
> atack doesn't work.

I remember someone wrote of the case where the attacker got the
file with the millions of passwords. Then if he also knows the
'mathematical magic' he could presumably do offline work. So I
suppose that the 'mathematical magic' has to be kept secret, which 
would work against the generally accepted crypto principles.

M. K. Shen


home help back first fref pref prev next nref lref last post