1994-06-03 - Re: Faster way to deescrow Clipper

Header Data

From: “Perry E. Metzger” <perry@imsi.com>
To: koontzd@lrcs.loral.com (David Koontz )
Message Hash: a03e1a5bdbf4674efe8ec1969a9ef9500caa4843f58b6f02fadae81e738972e2
Message ID: <9406031220.AA03835@snark.imsi.com>
Reply To: <9406030313.AA19017@io.lrcs.loral.com>
UTC Datetime: 1994-06-03 12:21:12 UTC
Raw Date: Fri, 3 Jun 94 05:21:12 PDT

Raw message

From: "Perry E. Metzger" <perry@imsi.com>
Date: Fri, 3 Jun 94 05:21:12 PDT
To: koontzd@lrcs.loral.com (David Koontz )
Subject: Re: Faster way to deescrow Clipper
In-Reply-To: <9406030313.AA19017@io.lrcs.loral.com>
Message-ID: <9406031220.AA03835@snark.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain



David Koontz says:
> 
> >From: Matthew Ghio <ghio@cmu.edu>
> 
> >Or you could just steal someone else's LEAF, by keeping a copy of
> >it, and use that for spoofing.  Then you could have a valid IV
> >too...
> 
> Were you not to mind the adversary being able to get the session key, alice
> and bob could have an agreed upon modulous (XOR value) for the IV, that could
> be introduced by save and restore crypto state commands and xor.
> 
> (assuming that a mode were used behaving isosynchronous.)
> 
> Would law-enforcement carl know to ask national security bruce for help?

What the hell are you talking about? Indeed, what the hell have you
been talking about for days?





Thread