neat question: http://www.arcot.com/arcot_ieee.pdf a method of protecting private keys using camouflage, in software, to prevent dictionary attacks. one password will decrypt correctly, many other passwords will produce alternate, valid-looking keys to fool an attacker. is this an example of security through obscurity (a thought which many frown upon, it seems)? please feel free to mail me personally if you want to shred/shed light. .paul bauerschmidt
- PATNEWS: The growing flood of "Wall Street"... Robert Hettinga
- Re: crypto camouflage in software paul a. bauerschmidt
- Re: crypto camouflage in software Ed Gerck
- Re: crypto camouflage in software Rick Smith
- Re: crypto camouflage in software Julian Assange