1998-09-21 - Re: ArcotSign (was Re: Does security depend on hardware?)

Header Data

From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: cryptography@c2.net
Message Hash: e2b3efdecfef281024e9987c937e9182b044638b4ae45a775e7e430dabc4cf35
Message ID: <36074AEB.63B74FA4@stud.uni-muenchen.de>
Reply To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
UTC Datetime: 1998-09-21 17:59:00 UTC
Raw Date: Tue, 22 Sep 1998 01:59:00 +0800

Raw message

From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 01:59:00 +0800
To: cryptography@c2.net
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <36074AEB.63B74FA4@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain



bram wrote:
> 
> On Mon, 21 Sep 1998, Bruce Schneier wrote:
> 
> > Here's the basic idea:  Strew a million passwords on your hard drive, and
> > make it impossible to verify which is the correct one offline.  So, someone
> > who steals the password file off the client cannot run a cracking tool
> > against the file.
> 
> Is this really patentable? It sounds a *lot* like the original public-key
> algorithm (the one involving lots of little 'puzzles')

A question : How does the legitimate user find his password?
(Sorry for not having followed this thread from the beginning.)

M. K. Shen





Thread