[14155] in cryptography@c2.net mail archive
RE: fyi: bear/enforcer open-source TCPA project
daemon@ATHENA.MIT.EDU (Scott Guthery)
Thu Sep 11 10:55:32 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 11 Sep 2003 09:31:35 -0400
From: "Scott Guthery" <sguthery@mobile-mind.com>
To: "bear" <bear@sonic.net>, "Sean Smith" <sws@cs.dartmouth.edu>
Cc: <cryptography@metzdowd.com>
There are roughly 1B GSM/3GPP/3GPP2=20
SIMs in daily use and the number of=20
keys extracted from them is diminishingly=20
small.
-----Original Message-----
From: bear [mailto:bear@sonic.net]
Sent: Thursday, September 11, 2003 3:43 AM
To: Sean Smith
Cc: cryptography@metzdowd.com
Subject: Re: fyi: bear/enforcer open-source TCPA project=20
On Wed, 10 Sep 2003, Sean Smith wrote:
>
>> So this doesn't
>> work unless you put a "speed limit" on CPU's, and that's ridiculous.
>
>Go read about the 4758. CPU speed won't help unless
>you can crack 2048-bit RSA, or figure out a way around
>the physical security, or find a flaw in the application.
You propose to put a key into a physical device and give it
to the public, and expect that they will never recover
the key from it? Seems unwise.
Bear
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to =
majordomo@metzdowd.com
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com