1993-04-12 - Security Dynamics

Header Data

From: Eric Hughes <hughes@soda.berkeley.edu>
To: cypherpunks@toad.com
Message Hash: 6f6a08f37e4788cd540133044f1f9f275ce92bf37f54bd01d2c2ae3e6784e908
Message ID: <9304121649.AA26494@soda.berkeley.edu>
Reply To: <ofl_2sj0Bwx29UQucJ@transarc.com>
UTC Datetime: 1993-04-12 16:53:09 UTC
Raw Date: Mon, 12 Apr 93 09:53:09 PDT

Raw message

From: Eric Hughes <hughes@soda.berkeley.edu>
Date: Mon, 12 Apr 93 09:53:09 PDT
To: cypherpunks@toad.com
Subject: Security Dynamics
In-Reply-To: <ofl_2sj0Bwx29UQucJ@transarc.com>
Message-ID: <9304121649.AA26494@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain


Re: security dynamics 

One could perform an interesting test with one of these Security
Dynamics card.

Aim a video camera at the LCD display so that the display takes up the
full width of the image.  Hook the video signal up to a digitizer
board, and recognize the numbers that appear on the face.  Spit them
out as often as they appear.  For someone with all the equipment, this
should be a one or two evening hack.

Now, if the number changes every minute, that's a little over 10,000
samples in a week, certainly enough to determine if they are using
weak random number generation.

I'll put the data on the ftp site, should anyone actually do this.

Eric





Thread