Nelson Minar <[EMAIL PROTECTED]> writes:
> More details are here:
>   http://web.media.mit.edu/~pappu/htm/res/resPOWF.htm
>   http://web.media.mit.edu/~pappu/htm/pubs/PappuPhDThesis01.pdf
> 
> Ravi's PhD has a section on replay attacks - section 10.3, page 135.
> The claim there is you can't store all possible challenge/response
> pairs because the keyspace is too big and that the actual system is
> too complex to simulate.

But if you can't simulate the system, that implies that the challenger
has to have stored the challenge-response pairs because he can't just
generate them, right? That means that only finitely many are likely to
be stored. Or was this thought of too?


-- 
Perry E. Metzger                [EMAIL PROTECTED]

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to