From: bram <bram@gawth.com>
To: Bruce Schneier <schneier@counterpane.com>
Message Hash: 8c5f2258c41ae0d0d6206d752b89af2ad3ae16e22492f96b803a5452c65f12d6
Message ID: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Reply To: <199809211030.FAA05159@mixer.visi.com>
UTC Datetime: 1998-09-21 07:15:04 UTC
Raw Date: Mon, 21 Sep 1998 15:15:04 +0800
From: bram <bram@gawth.com>
Date: Mon, 21 Sep 1998 15:15:04 +0800
To: Bruce Schneier <schneier@counterpane.com>
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <199809211030.FAA05159@mixer.visi.com>
Message-ID: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
MIME-Version: 1.0
Content-Type: text/plain
On Mon, 21 Sep 1998, Bruce Schneier wrote:
> Here's the basic idea: Strew a million passwords on your hard drive, and
> make it impossible to verify which is the correct one offline. So, someone
> who steals the password file off the client cannot run a cracking tool
> against the file.
Is this really patentable? It sounds a *lot* like the original public-key
algorithm (the one involving lots of little 'puzzles')
-Bram
Return to September 1998
Return to ““Todd S. Glassey” <TSGman@earthlink.net>”