On Wed, May 28, 2008 at 04:31:20PM -0700, David Schwartz wrote:

> > Only against random attacks of course, if all attackers first check these
> > keys, then removing them strengthens the algorithm against (non-random)
> > brute-force attack. This said, the effort of explicitly avoiding these
> > is probably wasted (unless one suspects one has a identically weak RNG).
> 
> I realize it's counter-intuitive, but even this is wrong. Suppose that
> there's an attack tool that everyone uses to attack a particular algorithm.
> It brute-forces passwords and follows a particular pattern.
> 
> If you use an implementation that is known to not use the first 10,000 keys
> this algorithm tests, attackers will respond by skipping those 10,000 keys.
> The net result will only be a reduction in the keyspace.

You are changing the premise.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to