[14150] in cryptography@c2.net mail archive
Re: fyi: bear/enforcer open-source TCPA project
daemon@ATHENA.MIT.EDU (bear)
Thu Sep 11 08:33:49 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 11 Sep 2003 00:42:58 -0700 (PDT)
From: bear <bear@sonic.net>
To: Sean Smith <sws@cs.dartmouth.edu>
Cc: cryptography@metzdowd.com
In-Reply-To: <200309101757.h8AHvfZ4019438@chipotle.cs.dartmouth.edu>
On Wed, 10 Sep 2003, Sean Smith wrote:
>
>> So this doesn't
>> work unless you put a "speed limit" on CPU's, and that's ridiculous.
>
>Go read about the 4758. CPU speed won't help unless
>you can crack 2048-bit RSA, or figure out a way around
>the physical security, or find a flaw in the application.
You propose to put a key into a physical device and give it
to the public, and expect that they will never recover
the key from it? Seems unwise.
Bear
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com