Steven Bellovin <s...@cs.columbia.edu> writes:

>Does anyone know of any (verifiable) examples of non-government enemies
>exploiting flaws in cryptography?

Could you be a bit more precise about what "flaws in cryptography" covers?  If 
you mean exploiting bad or incorrect implementations of crypto then there's so 
much that I barely know where to start, if it's actual cryptanalytic attacks 
on anything other than toy crypto (homebrew ciphers, known-weak keys, etc) 
then there's very little around.  If it's something else, you'd have to let us
know where the borders lie.

Peter.
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to