"paul a. bauerschmidt" <[EMAIL PROTECTED]> writes:
> neat question:
>
> http://www.arcot.com/arcot_ieee.pdf
>
> a method of protecting private keys using camouflage, in software, to
> prevent dictionary attacks.
>
> one password will decrypt correctly, many other passwords will produce
> a
>"paul a. bauerschmidt" wrote:
>> one password will decrypt correctly, many other passwords will produce
>> alternate, valid-looking keys to fool an attacker.
>>
>> is this an example of security through obscurity (a thought which many
>> frown upon, it seems)?
At 05:12 PM 10/8/99 -0700, Ed
"paul a. bauerschmidt" wrote:
> neat question:
>
> http://www.arcot.com/arcot_ieee.pdf
>
> a method of protecting private keys using camouflage, in software, to
> prevent dictionary attacks.
>
> one password will decrypt correctly, many other passwords will produce
> alternate, valid-lookin
neat question:
http://www.arcot.com/arcot_ieee.pdf
a method of protecting private keys using camouflage, in software, to
prevent dictionary attacks.
one password will decrypt correctly, many other passwords will produce
alternate, valid-looking keys to fool an attacker.
is this an exampl