Erich Titl wrote:

> Which implies that you send cleartext to the device and get cyphertext
back. So the easiest way to tamper the message is to intercept it at
> the  smartcard driver level :-) and modify it on the fly. If someone is
smart enough to fetch the key contents from memory while it is being used by
> the crypto software, he is smart enough to intercept the cleartext
message.

The issue is not whether someone can see your messages, the issue is whether
I can steal your private key!

> This device at least protects its contents against tampering, and does not
yield the key without authentication. And this authentication is done
> on the device itself.

Most USB devices now require password before allow to access...
And if you put your private key encrypted on such device, it is more or less
the same security level.

If you like to upgrade your security, you should buy a device that
implements smartcard... And replace your memory card.

Best Regards,
Alon Bar-Lev.



Reply via email to