fyi: bear/enforcer open-source TCPA project
Scott Guthery
sguthery at mobile-mind.com
Thu Sep 11 09:31:35 EDT 2003
There are roughly 1B GSM/3GPP/3GPP2
SIMs in daily use and the number of
keys extracted from them is diminishingly
small.
-----Original Message-----
From: bear [mailto:bear at sonic.net]
Sent: Thursday, September 11, 2003 3:43 AM
To: Sean Smith
Cc: cryptography at metzdowd.com
Subject: Re: fyi: bear/enforcer open-source TCPA project
On Wed, 10 Sep 2003, Sean Smith wrote:
>
>> So this doesn't
>> work unless you put a "speed limit" on CPU's, and that's ridiculous.
>
>Go read about the 4758. CPU speed won't help unless
>you can crack 2048-bit RSA, or figure out a way around
>the physical security, or find a flaw in the application.
You propose to put a key into a physical device and give it
to the public, and expect that they will never recover
the key from it? Seems unwise.
Bear
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list