1994-06-03 - Re: Faster way to deescrow Clipper

Header Data

From: koontzd@lrcs.loral.com (David Koontz )
To: cypherpunks@toad.com
Message Hash: 6f0388495d3baad6a63f658c4897f3002c08fa7872b56b0e36df8cad64c933c8
Message ID: <9406030313.AA19017@io.lrcs.loral.com>
Reply To: N/A
UTC Datetime: 1994-06-03 03:14:00 UTC
Raw Date: Thu, 2 Jun 94 20:14:00 PDT

Raw message

From: koontzd@lrcs.loral.com (David Koontz )
Date: Thu, 2 Jun 94 20:14:00 PDT
To: cypherpunks@toad.com
Subject: Re: Faster way to deescrow Clipper
Message-ID: <9406030313.AA19017@io.lrcs.loral.com>
MIME-Version: 1.0
Content-Type: text/plain



>From: Matthew Ghio <ghio@cmu.edu>

>Or you could just steal someone else's LEAF, by keeping a copy of it, and use
>that for spoofing.  Then you could have a valid IV too...

Were you not to mind the adversary being able to get the session key, alice
and bob could have an agreed upon modulous (XOR value) for the IV, that could
be introduced by save and restore crypto state commands and xor.

(assuming that a mode were used behaving isosynchronous.)

Would law-enforcement carl know to ask national security bruce for help?





Thread