Protection for quasi-offline memory nabbing
Steven M. Bellovin
smb at cs.columbia.edu
Wed Mar 19 21:56:49 EDT 2008
I've been thinking about similar issues. It seems to me that just
destroying the key schedule is a big help -- enough bits will change in
the key that data recovery using just the damaged key is hard, per
comments in the paper itself.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list