neat question:

http://www.arcot.com/arcot_ieee.pdf

 a method of protecting private keys using camouflage, in software, to
 prevent dictionary attacks.

 one password will decrypt correctly, many other passwords will produce
 alternate, valid-looking keys to fool an attacker.

 is this an example of security through obscurity (a thought which many
 frown upon, it seems)?


 please feel free to mail me personally if you want to shred/shed light.

.paul bauerschmidt

Reply via email to