From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: a6595dd01a2be4dfff6c1b71595c7c6e3e8cd384b197168c04893d7d5fb42a55
Message ID: <1.5.4.32.19961031202422.0069633c@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-10-31 20:25:36 UTC
Raw Date: Thu, 31 Oct 1996 12:25:36 -0800 (PST)
From: John Young <jya@pipeline.com>
Date: Thu, 31 Oct 1996 12:25:36 -0800 (PST)
To: cypherpunks@toad.com
Subject: COR_set
Message-ID: <1.5.4.32.19961031202422.0069633c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
10-31-96. FiTi:
"How to crack secret computer codes."
Bellcore researchers plan to publish on the Internet
this week technical details of a new method of cracking
encryption systems used to protect computer data. The
approach relies on spotting errors made by computers and
applying a mathematical equation to work out secret
encryption codes. "This is very sophisticated math. The
only people who will understand it are other
cryptography experts."
-----
http://jya.com/corset.txt (3 kb)
COR_set
Details of the Bellcore smartcard hack? When, where?
Return to October 1996
Return to “John Young <jya@pipeline.com>”
1996-10-31 (Thu, 31 Oct 1996 12:25:36 -0800 (PST)) - COR_set - John Young <jya@pipeline.com>