[18966] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: the effects of a spy

daemon@ATHENA.MIT.EDU (Travis H.)
Thu Nov 17 09:26:47 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 16 Nov 2005 22:13:28 -0600
From: "Travis H." <solinym@gmail.com>
To: "leichter_jerrold@emc.com" <leichter_jerrold@emc.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <Pine.SOL.4.61.0511161216220.4869@frame>

> actually justified for cryptosystems:  It turned out, on the key escrow s=
ide
> of the protocol design, NSA actually fell over the edge, and there was a
> simple attack (Matt Blaze's work, as I recall).

Details on the so-called LEAF blower here:
http://www.crypto.com/papers/eesproto.pdf
--
http://www.lightconsulting.com/~travis/  -><-
"We already have enough fast, insecure systems." -- Schneier & Ferguson
GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post