[Cryptography] Data Protection Against Quantum Computing Brute Force via Device ID

Natanael natanael.l at gmail.com
Fri Jun 8 15:52:04 EDT 2018


Den fre 8 juni 2018 21:22Govind Yadav <yadavgovind at hotmail.com> skrev:

>
> The ultimate solution to this problem is that instead of application,
> embed Device ID technology directly into the encryption algorithm - there
> is no other way out. Then the Algo, along with usual crypto operations,
> will also check Device ID as described in the paper and stop the process if
> device is found to be rouge.
>

In practical terms, application = algoritm. All of the math and code and
instructions becomes electrical impulses in the CPU:s. There's no tangible
difference.

This is simply not possible without using specialized security hardware
like TPM or smartcards - the algorithm can not know if the attacker lies
about the provided device ID. The attacker controls *everything*, he can
perfectly emulate the target device for as long as he knows everything he
need to knows about it (hardware / firmware / OS / applications).
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20180608/9f7be8e1/attachment.html>


More information about the cryptography mailing list