[14154] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: fyi: bear/enforcer open-source TCPA project

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Thu Sep 11 10:54:50 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Fri, 12 Sep 2003 00:53:36 +1200
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: bear@sonic.net, rsalz@datapower.com
Cc: cryptography@metzdowd.com

Rich Salz <rsalz@datapower.com> writes:

>Second, if the key's in hardware you *know* it's been stolen.  You don't know
>that for software.

Only for some definitions of "stolen".  A key held in a smart card that does
absolutely everything the untrusted PC it's connected to tells it to is only
marginally more secure than a key held in software on said PC, even though you
can only steal one of the two without physical access.  To put it another way,
a lot of the time you don't need to actually steal a key to cause damage - it
doesn't matter whether a fraudulent withdrawal is signed on my PC with a
stolen key or on your PC with a smart card controlled by a trojan horse, all
that matters is that the transaction is signed somewhere.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post