[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Smart card attacks vs. clipper?
Has any work been done (yet) using the recently-publicised techniques
used to foil smart card tamperproofing against Clipper implementations?
Seems like it's a bit of a different story, since in the Clipper's
case the algorithm is (ostensibly) unknown, but I'm just curious as
to whether there is some compromise of its security-through-obscurity.
--
______c_________________________________________________________________
Mike M Nally * IBM % Tivoli * Austin TX * How quickly we forget that
mailto:[email protected] mailto:[email protected] * "deer processing" and "data
http://www.io.com/~m101/ * processing" are different!