[5862] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

crypto camouflage in software

daemon@ATHENA.MIT.EDU (paul a. bauerschmidt)
Fri Oct 8 19:54:32 1999

Date: Fri, 8 Oct 1999 10:14:57 -0700 (PDT)
From: "paul a. bauerschmidt" <bauersc@bauerschmidt.com>
Cc: cryptography@c2.net
In-Reply-To: <v04210171b41ae800e992@[207.244.108.117]>
Message-ID: <Pine.BSF.4.10.9910081003320.25703-100000@shell.tsoft.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII


neat question:

http://www.arcot.com/arcot_ieee.pdf

 a method of protecting private keys using camouflage, in software, to
 prevent dictionary attacks.

 one password will decrypt correctly, many other passwords will produce
 alternate, valid-looking keys to fool an attacker.

 is this an example of security through obscurity (a thought which many
 frown upon, it seems)?


 please feel free to mail me personally if you want to shred/shed light.

.paul bauerschmidt



home help back first fref pref prev next nref lref last post