Re: crypto camouflage in software

1999-10-13 Thread Julian Assange
"paul a. bauerschmidt" <[EMAIL PROTECTED]> writes: > neat question: > > http://www.arcot.com/arcot_ieee.pdf > > a method of protecting private keys using camouflage, in software, to > prevent dictionary attacks. > > one password will decrypt correctly, many other passwords will produce > a

Re: crypto camouflage in software

1999-10-11 Thread Rick Smith
>"paul a. bauerschmidt" wrote: >> one password will decrypt correctly, many other passwords will produce >> alternate, valid-looking keys to fool an attacker. >> >> is this an example of security through obscurity (a thought which many >> frown upon, it seems)? At 05:12 PM 10/8/99 -0700, Ed

Re: crypto camouflage in software

1999-10-08 Thread Ed Gerck
"paul a. bauerschmidt" wrote: > neat question: > > http://www.arcot.com/arcot_ieee.pdf > > a method of protecting private keys using camouflage, in software, to > prevent dictionary attacks. > > one password will decrypt correctly, many other passwords will produce > alternate, valid-lookin