Re: ArcotSign (was Re: Does security depend on hardware?)

New Message Reply About this list Date view Thread view Subject view Author view

Mok-Kong Shen (mok-kong.shen@stud.uni-muenchen.de)
Tue, 22 Sep 1998 14:47:45 +0100


Bruce Schneier wrote:
>
> At 02:28 PM 9/22/98 +0100, Mok-Kong Shen wrote:
> >Bruce Schneier wrote:
> >>
> >> At 02:20 PM 9/22/98 +0100, Mok-Kong Shen wrote:
> >
> >> >If the 'mathematical magic' is not to be kept secret (as in principle
> >> >shouldn't for all crypto algorithms) then presumably one could
> >> >attack through brute forcing the 'remembered secrect', I guess.
> >>
> >> Yes, but only through an on-line protocol. And if the server has some
> >> kind of "turn the user off after ten bad password guesses," then the
> >> atack doesn't work.
> >
> >I remember someone wrote of the case where the attacker got the
> >file with the millions of passwords. Then if he also knows the
> >'mathematical magic' he could presumably do offline work. So I
> >suppose that the 'mathematical magic' has to be kept secret, which
> >would work against the generally accepted crypto principles.
>
> No. The online protocol can be public. Nothing has to be kept secret
> in order for this to work. That would be stupid; we all know that.

I suppose you misunderstood me. I mean the 'mathematical magic'
cannot be made public. (Or is 'online protocol' = 'mathematical magic'?)
If the 'magic' is public then the attacker with the pool of passwords
could brute force offline.

M. K. Shen


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:14:00