Re: gnupg / rsa padding question

I've wondered also about Crypto AG. Anyone know how they hacked it?

If I had to do it, I'd hack the random number generator for the session
keys. That way the input-output would still match a standard algorithm

Covert channels doesn't make sense to me -- with the steganographic
type, the bandwidth is too small, if possible, while timing or resource
utilisation is not feasible with the sort of eavesdropping I envisage.



Relevant Pages

  • [0/many] Acrypto - asynchronous crypto layer for linux kernel 2.6
    ... I'm pleased to announce asynchronous crypto layer for Linux kernel 2.6. ... crypto session routing ... queue)) if it exists. ... new crypto routing entry which points to returned device and adds it to ...
  • Re: Comments re ISCs announcement on bind9 security
    ... It's a text published by ISC as a follow up to the bind9 predictable id saga. ... less an issue of using "extremely weak crypto" as it has been ... than the use of a random number generator that did not ... The particular pseudo-random number generator that BIND 9 now uses is a poor ...
  • Fw: [PATCH 1/2] CryptoAPI: prepare for processing multiple buffers at a time
    ... Actualy acrypto genetically allows to use such hardware acceleration. ... When hardware has access to the queue of requests it can do anything ... acrypto archive - asynchronous crypto layer, ... crypto session routing ...
  • Re: Math.random
    ... the number of bits the generator outputs at a time has nothing ... their succession present systematic biases. ... as the design of UUIDs assumes them to be. ... crypto system of all, the Vernam cipher or one-time pad. ...
  • Re: crypto(9) choose another driver if we cannot open a session on it
    ... another cryptographic driver if we cannot open a session on the ... the algorithms when we open a session. ... By using a fake "crypto ... It was a reason why I made the s/w driver into a pseudo device. ...