[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Time Keys, Some Secure Ideas (by Alias: Jay Hyden)



Jay - you wrote:
>             >> Time Keys, Some Secure Ideas <<
> The weakest attack on a time key based system is to spoof the
>computer that keeps track of time into releasing encryption
>keys i.e. change the clock.

No, the weakest link is that you have to trust the person _running_
the time key system.  Spoofing the clock only matters to a system 
you trust.  Even a system running on a satellite isn't trustable
unless you're running it yourself; your good friend and business partner
who launched it may have put in a backdoor because the KGB threatened
to kill his grandmother if he didn't.
#---
# Bill Stewart, Freelance Information Architect, [email protected]
# Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281
#---