[12764] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: Encryption of data in smart cards

daemon@ATHENA.MIT.EDU (John Kelsey)
Fri Mar 14 19:54:20 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
Date: Fri, 14 Mar 2003 01:13:28 -0500
To: "Trei, Peter" <ptrei@rsasecurity.com>,
	Krister Walfridsson <cato@df.lth.se>, Werner Koch <wk@gnupg.org>
From: John Kelsey <kelsey.j@ix.netcom.com>
Cc: cryptography@wasabisystems.com
In-Reply-To: <F504A8CEE925D411AF4A00508B8BE90A04D4A667@exna07.securitydy
 namics.com>

At 01:23 PM 3/13/03 -0500, Trei, Peter wrote:
>Every PINned SC I've seen has a very limited (typically 3) number
>of failed attempts before it locks itself up. Once it's locked up, it
>can only be reactivated by an administrator PIN, which is held
>at much higher security by the issuer, and not available to the
>card user.

Right.  Which is good for the PIN-guessing-to-get-access attack, but not 
much help for the decrypting the extracted data using the PIN-generated key 
attack.

>Peter

--John Kelsey, kelsey.j@ix.netcom.com



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post