From: Jeff Weinstein <jsw@netscape.com>
To: Anonymous <anon-remailer@utopia.hacktic.nl>
Message Hash: 3c491623e60cafeab93f17f103376214cc39eb8e5dce1c5cbe169e21877679cb
Message ID: <30CC0D31.293C@netscape.com>
Reply To: <199512110845.JAA25564@utopia.hacktic.nl>
UTC Datetime: 1995-12-11 21:53:30 UTC
Raw Date: Tue, 12 Dec 1995 05:53:30 +0800
From: Jeff Weinstein <jsw@netscape.com>
Date: Tue, 12 Dec 1995 05:53:30 +0800
To: Anonymous <anon-remailer@utopia.hacktic.nl>
Subject: Re: Timing Cryptanalysis Attack
In-Reply-To: <199512110845.JAA25564@utopia.hacktic.nl>
Message-ID: <30CC0D31.293C@netscape.com>
MIME-Version: 1.0
Content-Type: text/plain
Anonymous wrote:
> So while this is a very nice piece of work, and certainly of
> theoretical interest, I don't think it will modify the way in
> which people are advised to utilize cryptographic software, or
> cause companies like Netscape of RSADSI to shed any tears.
While an exploit of this attack against our software has not
been demonstrated, and there is some debate about whether it
will even work, we are taking it very seriously. We've been
working with Paul to develop a fix, which we will implement
even if the attack is never proven effective against our software.
--Jeff
PS - I think Paul was a bit surprised when Jim Barksdale pulled
out his wallet and handed him 10 crisp $100 bills. :-)
--
Jeff Weinstein - Electronic Munitions Specialist
Netscape Communication Corporation
jsw@netscape.com - http://home.netscape.com/people/jsw
Any opinions expressed above are mine.
Return to December 1995
Return to “Tom Weinstein <tomw@netscape.com>”