Re: crypto camouflage in software

1999-10-13 Thread Julian Assange
"paul a. bauerschmidt" [EMAIL PROTECTED] writes: neat question: http://www.arcot.com/arcot_ieee.pdf a method of protecting private keys using camouflage, in software, to prevent dictionary attacks. one password will decrypt correctly, many other passwords will produce alternate,

Re: crypto camouflage in software

1999-10-11 Thread Rick Smith
"paul a. bauerschmidt" wrote: one password will decrypt correctly, many other passwords will produce alternate, valid-looking keys to fool an attacker. is this an example of security through obscurity (a thought which many frown upon, it seems)? At 05:12 PM 10/8/99 -0700, Ed Gerck