From: Eric Hughes <hughes@soda.berkeley.edu>
To: cypherpunks@toad.com
Message Hash: 6f6a08f37e4788cd540133044f1f9f275ce92bf37f54bd01d2c2ae3e6784e908
Message ID: <9304121649.AA26494@soda.berkeley.edu>
Reply To: <ofl_2sj0Bwx29UQucJ@transarc.com>
UTC Datetime: 1993-04-12 16:53:09 UTC
Raw Date: Mon, 12 Apr 93 09:53:09 PDT
From: Eric Hughes <hughes@soda.berkeley.edu>
Date: Mon, 12 Apr 93 09:53:09 PDT
To: cypherpunks@toad.com
Subject: Security Dynamics
In-Reply-To: <ofl_2sj0Bwx29UQucJ@transarc.com>
Message-ID: <9304121649.AA26494@soda.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain
Re: security dynamics
One could perform an interesting test with one of these Security
Dynamics card.
Aim a video camera at the LCD display so that the display takes up the
full width of the image. Hook the video signal up to a digitizer
board, and recognize the numbers that appear on the face. Spit them
out as often as they appear. For someone with all the equipment, this
should be a one or two evening hack.
Now, if the number changes every minute, that's a little over 10,000
samples in a week, certainly enough to determine if they are using
weak random number generation.
I'll put the data on the ftp site, should anyone actually do this.
Eric
Return to April 1993
Return to “Pat_Barron@transarc.com”