From: jim@bilbo.suite.com (Jim Miller)
To: rittle@comm.mot.com
Message Hash: 20e4863dd1c2a5de03f3a864306365b64bd69fc6b144a77394b5c110c464e050
Message ID: <9512140222.AA23036@bilbo.suite.com>
Reply To: N/A
UTC Datetime: 1995-12-14 17:10:11 UTC
Raw Date: Fri, 15 Dec 1995 01:10:11 +0800
From: jim@bilbo.suite.com (Jim Miller)
Date: Fri, 15 Dec 1995 01:10:11 +0800
To: rittle@comm.mot.com
Subject: Re: Attacking Clipper with timing info?
Message-ID: <9512140222.AA23036@bilbo.suite.com>
MIME-Version: 1.0
Content-Type: text/plain
> Without having the details of the algorithm, I suspect
> the answer is 'remotely possible, at best'.
>
> However, to extend what I suspect you were getting at:
>
> It would be very interesting to determine if the NSA knew
> about this crypto-design problem...
>
That was indeed what I was wondering. I expect we wont have to wait too
long before we hear whether Clipper chips require the same or a different
amount of time to encrypt/decrypt. Should be interesting.
Jim_Miller@suite.com
Return to December 1995
Return to “Matt Blaze <mab@crypto.com>”