The content, once extracted, was interesting to someone who did not know how locks worked, but the attack was obvious as soon as one read the description of how master keys worked.
To dress this up with "P(H-1) key blanks", "rights amplification", oracles, and other crypto analogies, was silly. Harv Matt Blaze wrote: > > A brief summary is available on my web page at > http://www.crypto.com/masterkey.html > with links to the full (4MB) paper. > > Note that this is a bit slashdotted at the moment... > > -matt > > --------------------------------------------------------------------- > The Cryptography Mailing List > Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED] __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]