"paul a. bauerschmidt" [EMAIL PROTECTED] writes:
neat question:
http://www.arcot.com/arcot_ieee.pdf
a method of protecting private keys using camouflage, in software, to
prevent dictionary attacks.
one password will decrypt correctly, many other passwords will produce
alternate,
"paul a. bauerschmidt" wrote:
one password will decrypt correctly, many other passwords will produce
alternate, valid-looking keys to fool an attacker.
is this an example of security through obscurity (a thought which many
frown upon, it seems)?
At 05:12 PM 10/8/99 -0700, Ed Gerck