Re: crypto camouflage in software

1999-10-13 Thread Julian Assange
"paul a. bauerschmidt" <[EMAIL PROTECTED]> writes: > neat question: > > http://www.arcot.com/arcot_ieee.pdf > > a method of protecting private keys using camouflage, in software, to > prevent dictionary attacks. > > one password will decrypt correctly, many other passwords will produce > a

Re: crypto camouflage in software

1999-10-11 Thread Rick Smith
>"paul a. bauerschmidt" wrote: >> one password will decrypt correctly, many other passwords will produce >> alternate, valid-looking keys to fool an attacker. >> >> is this an example of security through obscurity (a thought which many >> frown upon, it seems)? At 05:12 PM 10/8/99 -0700, Ed

Re: crypto camouflage in software

1999-10-08 Thread Ed Gerck
"paul a. bauerschmidt" wrote: > neat question: > > http://www.arcot.com/arcot_ieee.pdf > > a method of protecting private keys using camouflage, in software, to > prevent dictionary attacks. > > one password will decrypt correctly, many other passwords will produce > alternate, valid-lookin

crypto camouflage in software

1999-10-08 Thread paul a. bauerschmidt
neat question: http://www.arcot.com/arcot_ieee.pdf a method of protecting private keys using camouflage, in software, to prevent dictionary attacks. one password will decrypt correctly, many other passwords will produce alternate, valid-looking keys to fool an attacker. is this an exampl