in this case is equivalent to either
cracking the session key RNG, or cracking the symmetric cipher, the
ability to do either of which obviates the need to deduce the RSA
private key in the first place.
-Michael Robinson
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "uns
at are prime), or
P * 340,282,366,920,938,463,463,374,607,431,768,211,456 functions F.
Back to the drawing board, I would say.
-Michael Robinson
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
in this case is equivalent to either
cracking the session key RNG, or cracking the symmetric cipher, the
ability to do either of which obviates the need to deduce the RSA
private key in the first place.
-Michael Robinson
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "uns
at are prime), or
P * 340,282,366,920,938,463,463,374,607,431,768,211,456 functions F.
Back to the drawing board, I would say.
-Michael Robinson
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Wed, Oct 24, 2001 at 10:19:59AM +0200, Christian Kurz wrote:
> On 23/10/01, Michael Robinson wrote:
> > On Tue, Oct 23, 2001 at 09:55:04AM +0200, Christian Kurz wrote:
> > > Do you know how difficult and time-consuming it really is to do a manual
> > > source cod
On Wed, Oct 24, 2001 at 10:19:59AM +0200, Christian Kurz wrote:
> On 23/10/01, Michael Robinson wrote:
> > On Tue, Oct 23, 2001 at 09:55:04AM +0200, Christian Kurz wrote:
> > > Do you know how difficult and time-consuming it really is to do a manual
> > > source cod
aused casual
observers to erroneously believe FreeBSD is less secure than other less
carefully managed operating system projects.
Yes, source-code audits are time-consuming. Time-consuming is different
from "not possible", however. The alternative is the "ostrich" method of
securi
aused casual
observers to erroneously believe FreeBSD is less secure than other less
carefully managed operating system projects.
Yes, source-code audits are time-consuming. Time-consuming is different
from "not possible", however. The alternative is the "ostrich" method of
securi
8 matches
Mail list logo