[14155] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: fyi: bear/enforcer open-source TCPA project

daemon@ATHENA.MIT.EDU (Scott Guthery)
Thu Sep 11 10:55:32 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 11 Sep 2003 09:31:35 -0400
From: "Scott Guthery" <sguthery@mobile-mind.com>
To: "bear" <bear@sonic.net>, "Sean Smith" <sws@cs.dartmouth.edu>
Cc: <cryptography@metzdowd.com>

There are roughly 1B GSM/3GPP/3GPP2=20
SIMs in daily use and the number of=20
keys extracted from them is diminishingly=20
small.

-----Original Message-----
From: bear [mailto:bear@sonic.net]
Sent: Thursday, September 11, 2003 3:43 AM
To: Sean Smith
Cc: cryptography@metzdowd.com
Subject: Re: fyi: bear/enforcer open-source TCPA project=20




On Wed, 10 Sep 2003, Sean Smith wrote:

>
>> So this doesn't
>> work unless you put a "speed limit" on CPU's, and that's ridiculous.
>
>Go read about the 4758.  CPU speed won't help unless
>you can crack 2048-bit RSA, or figure out a way around
>the physical security, or find a flaw in the application.

You propose to put a key into a physical device and give it
to the public, and expect that they will never recover
the key from it?  Seems unwise.

			Bear

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to =
majordomo@metzdowd.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post