>"paul a. bauerschmidt" wrote:

>>  one password will decrypt correctly, many other passwords will produce
>>  alternate, valid-looking keys to fool an attacker.
>>
>>  is this an example of security through obscurity (a thought which many
>>  frown upon, it seems)?

At 05:12 PM 10/8/99 -0700, Ed Gerck wrote:
>
>No, it is IMO a valid example of security through ambiguity.  

One time pads rely on the same general idea taken to its extreme: any
decryption is as plausible as any other. I've always thought this is the
essence of a good password encryption scheme: try to eliminate the internal
cues that indicate whether the result is valid or not. That way the
attacker can only verify a decryption by using it in a genuine
authentication transaction. If the decryption is wrong, the attempt gets
logged, leaving a trace of the attempt.


Rick.
[EMAIL PROTECTED]
"Internet Cryptography" at http://www.visi.com/crypto/

Reply via email to