irst (and for naive and unsafe usage in PC world)?
Bye for now
Tasos Parisinos
-
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
On Wed, April 11, 2007 12:14, Tasos Parisinos wrote:
If you are a vendor of a smart phone, a router, or worst, a point of sale
terminal you care about three things. The first is that the end user can't open
the device to probe it or alter it in a way that would create fraud. For exam
ack with a very-very different version of these parts and this will take
time.
I think it is worth to try to make a version which will use the crypto api glue
code and re-post...
Best regards
Tasos Parisinos
-
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
t
What kind of applications are we talking about here? I'd like to hack
hardware I own.
payment systems, EMV terminals, mobile phone applications
Tasos Parisinos
-
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL
that case by someone root privileged with a
good
understanding of the system internals.
As for Vista, no comments.... :)
Best regards
Tasos Parisinos
-
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majord
Andi Kleen wrote:
Tasos Parisinos <[EMAIL PROTECTED]> writes:
From: Tasos Parisinos <[EMAIL PROTECTED]>
This patch adds module rsa.ko in the kernel (built-in or as a kernel
module) and offers an API to do fast modular exponentiation, using the
Montgomery algorithm, thus the ex
From: Tasos Parisinos <[EMAIL PROTECTED]>
This patch adds module rsa.ko in the kernel (built-in or as a kernel module)
and offers an API to do fast modular exponentiation, using the Montgomery
algorithm, thus the exponentiation is not generic but can be used only when
the modulus is odd
From: Tasos Parisinos <[EMAIL PROTECTED]>
This patch adds module rsa.ko in the kernel (built-in or as a kernel module)
and offers an API to do fast modular exponentiation, using the Montgomery
algorithm, thus the exponentiation is not generic but can be used only when
the modulus is odd
s your opinion on that?
All the other changes suggested where carried out
Tasos Parisinos
-
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
On Wed, March 21, 2007 16:50, Tasos Parisinos wrote:
A malicious person may want to alter code on the detachable (and unsafe)
file system.
Lots of stuff including the kernel will be in a trapped casing (opening,
probing it, power
analyzing it, heating it etc will result in system suicide
don't need it.
I mean we created for our specific use, other may want to use it to
(maybe for
the same reasons, who knows) why not make it available? Isn't that what
open source
is about?
And on the bottom line, why not have a module and functionality that Linux
competitors provide and
This patch changes the crypto/Kconfig crypto/Makefile and adds
crypto/rsa.c. These files add module named rsa.o (rsa.ko) built-in or as
a kernel module and offer an API to do fast modular exponentiation
and other multi-precision arithmetics.
Signed-off-by: Tasos Parisinos <[EMAIL PROTEC
on the previous message the exponent is not 32 bits but 64 bits, sorry
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.o
Indan Zupancic wrote:
On Wed, March 21, 2007 14:07, Tasos Parisinos wrote:
On Wed, March 21, 2007 10:15, Tasos Parisinos wrote:
Protecting a TripleDES key in high security standards is not as
simple as making the kernel read
protected, you need a whole lot and
that also means
On Wed, March 21, 2007 10:15, Tasos Parisinos wrote:
Protecting a TripleDES key in high security standards is not as
simple as making the kernel read
protected, you need a whole lot and
that also means hardware (cryptomemories e.t.c)
So you forget about all this overhead when you use
en
you can use
a symmetric scheme
Tasos Parisinos
-
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Assuming you have a secure kernel binary that is tamper proof, why do you need
slow and complex asymmetric encryption again? If you can write protect the
kernel,
you can also read protect it (or let the boot loader pass the key to the
kernel).
So what stops you from using a simple symmetric key
other code, don't depend anyhow on userland, don't care about elf formats,
or where the signature is, or key management, i leave those up to the others
to design
this is just modular exponentiation as simple as can be
Tasos Parisinos
-
-
To unsubscribe from this list: send the li
Thanks for your comments
On Mon, Mar 19, 2007 at 06:22:15PM +0200, Tasos Parisinos wrote:
+static inline _i32 rsa_max(_i32 x, _i32 y)
+{
+return (x > y)? x: y;
+}
We've got a max() already. Use tabs.
This is right, will be fixed, just hate discipline
+
+/*
+ * Module
arithmetics, if any
kernel module may need it
--
Tasos Parisinos
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
From: Tasos Parisinos <[EMAIL PROTECTED]>
This patch changes the crypto/Kconfig and crypto/Makefile and adds
crypto/rsa.c and crypto/rsa.h in the source tree. These files add
module rsa.o (or rsa.ko) in the kernel (built-in or as a kernel module)
and offer an API to do fast m
From: Tasos Parisinos <[EMAIL PROTECTED]>
This patch changes the crypto/Kconfig and crypto/Makefile and adds
crypto/rsa.c and crypto/rsa.h in the source tree. These files add module
rsa.o (or rsa.ko) in the
kernel (built-in or as a kernel module) and offer an API to do fast
m
From: Tasos Parisinos <[EMAIL PROTECTED]>
This patch changes the crypto/Kconfig and crypto/Makefile and adds
crypto/rsa.c and crypto/rsa.h in the source tree. These files add module
rsa.o (or rsa.ko) in the
kernel (built-in or as a kernel module) and offer an API to do fast
m
23 matches
Mail list logo