[18770] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

On Digital Cash-like Payment Systems

daemon@ATHENA.MIT.EDU (James A. Donald)
Wed Oct 26 12:12:11 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com, cypherpunks@jfet.org
Date: Wed, 26 Oct 2005 08:53:02 -0700
In-reply-to: <20051024223836.GI4102@epointsystem.org>



Date sent:      	Tue, 25 Oct 2005 00:38:36 +0200
To:             	cyphrpunk <cyphrpunk@gmail.com>
Copies to:      	John Kelsey <kelsey.j@ix.netcom.com>, Ian G <iang@systemics.com>,
       	ray@unipay.nl, cryptography@metzdowd.com, cypherpunks@jfet.org
From:           	nagydani@epointsystem.org (Daniel A. Nagy)
Subject:        	Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like Payment Systems

> One intresting security measure protecting valuable digital assets (WM
> protects private keys this way) is "inflating" them before encryption.
> 
> While it does not protect agains trojan applications, it does a surprisingly
> good job at reducing attacks following the key logging + file theft pattern.
> 
> This security measure depends on two facts: storage being much cheaper than
> bandwidth and transmission of long files being detectable, allowing for
> detecting  and thwarting an attack in progress.

How does one inflate a key?
> 
> -- 
> Daniel
> 
> 
> 



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post