[18770] in cryptography@c2.net mail archive
On Digital Cash-like Payment Systems
daemon@ATHENA.MIT.EDU (James A. Donald)
Wed Oct 26 12:12:11 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com, cypherpunks@jfet.org
Date: Wed, 26 Oct 2005 08:53:02 -0700
In-reply-to: <20051024223836.GI4102@epointsystem.org>
Date sent: Tue, 25 Oct 2005 00:38:36 +0200
To: cyphrpunk <cyphrpunk@gmail.com>
Copies to: John Kelsey <kelsey.j@ix.netcom.com>, Ian G <iang@systemics.com>,
ray@unipay.nl, cryptography@metzdowd.com, cypherpunks@jfet.org
From: nagydani@epointsystem.org (Daniel A. Nagy)
Subject: Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like Payment Systems
> One intresting security measure protecting valuable digital assets (WM
> protects private keys this way) is "inflating" them before encryption.
>
> While it does not protect agains trojan applications, it does a surprisingly
> good job at reducing attacks following the key logging + file theft pattern.
>
> This security measure depends on two facts: storage being much cheaper than
> bandwidth and transmission of long files being detectable, allowing for
> detecting and thwarting an attack in progress.
How does one inflate a key?
>
> --
> Daniel
>
>
>
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com