From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
To: cryptography@c2.net
Message Hash: e2b3efdecfef281024e9987c937e9182b044638b4ae45a775e7e430dabc4cf35
Message ID: <36074AEB.63B74FA4@stud.uni-muenchen.de>
Reply To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
UTC Datetime: 1998-09-21 17:59:00 UTC
Raw Date: Tue, 22 Sep 1998 01:59:00 +0800
From: Mok-Kong Shen <mok-kong.shen@stud.uni-muenchen.de>
Date: Tue, 22 Sep 1998 01:59:00 +0800
To: cryptography@c2.net
Subject: Re: ArcotSign (was Re: Does security depend on hardware?)
In-Reply-To: <Pine.LNX.3.96.980921133001.20069A-100000@blackbox>
Message-ID: <36074AEB.63B74FA4@stud.uni-muenchen.de>
MIME-Version: 1.0
Content-Type: text/plain
bram wrote:
>
> On Mon, 21 Sep 1998, Bruce Schneier wrote:
>
> > Here's the basic idea: Strew a million passwords on your hard drive, and
> > make it impossible to verify which is the correct one offline. So, someone
> > who steals the password file off the client cannot run a cracking tool
> > against the file.
>
> Is this really patentable? It sounds a *lot* like the original public-key
> algorithm (the one involving lots of little 'puzzles')
A question : How does the legitimate user find his password?
(Sorry for not having followed this thread from the beginning.)
M. K. Shen
Return to September 1998
Return to ““Todd S. Glassey” <TSGman@earthlink.net>”