From: “Perry E. Metzger” <perry@imsi.com>
To: koontzd@lrcs.loral.com (David Koontz )
Message Hash: a03e1a5bdbf4674efe8ec1969a9ef9500caa4843f58b6f02fadae81e738972e2
Message ID: <9406031220.AA03835@snark.imsi.com>
Reply To: <9406030313.AA19017@io.lrcs.loral.com>
UTC Datetime: 1994-06-03 12:21:12 UTC
Raw Date: Fri, 3 Jun 94 05:21:12 PDT
From: "Perry E. Metzger" <perry@imsi.com>
Date: Fri, 3 Jun 94 05:21:12 PDT
To: koontzd@lrcs.loral.com (David Koontz )
Subject: Re: Faster way to deescrow Clipper
In-Reply-To: <9406030313.AA19017@io.lrcs.loral.com>
Message-ID: <9406031220.AA03835@snark.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain
David Koontz says:
>
> >From: Matthew Ghio <ghio@cmu.edu>
>
> >Or you could just steal someone else's LEAF, by keeping a copy of
> >it, and use that for spoofing. Then you could have a valid IV
> >too...
>
> Were you not to mind the adversary being able to get the session key, alice
> and bob could have an agreed upon modulous (XOR value) for the IV, that could
> be introduced by save and restore crypto state commands and xor.
>
> (assuming that a mode were used behaving isosynchronous.)
>
> Would law-enforcement carl know to ask national security bruce for help?
What the hell are you talking about? Indeed, what the hell have you
been talking about for days?
Return to June 1994
Return to ““Perry E. Metzger” <perry@imsi.com>”