[5862] in cryptography@c2.net mail archive
crypto camouflage in software
daemon@ATHENA.MIT.EDU (paul a. bauerschmidt)
Fri Oct 8 19:54:32 1999
Date: Fri, 8 Oct 1999 10:14:57 -0700 (PDT)
From: "paul a. bauerschmidt" <bauersc@bauerschmidt.com>
Cc: cryptography@c2.net
In-Reply-To: <v04210171b41ae800e992@[207.244.108.117]>
Message-ID: <Pine.BSF.4.10.9910081003320.25703-100000@shell.tsoft.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
neat question:
http://www.arcot.com/arcot_ieee.pdf
a method of protecting private keys using camouflage, in software, to
prevent dictionary attacks.
one password will decrypt correctly, many other passwords will produce
alternate, valid-looking keys to fool an attacker.
is this an example of security through obscurity (a thought which many
frown upon, it seems)?
please feel free to mail me personally if you want to shred/shed light.
.paul bauerschmidt