[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: ArcotSign (was Re: Does security depend on hardware?)
>>In that case please allow me to go back to a point raised by me
>>previously. The user uses his 'remembered secret' (of fewer bits)
>>through a public algorithm (including protocol) to retrieve from a
>>pool the password (of more bits). If the attacker doesn't have the
>>pool then everything looks fine. But if he manages to get the pool
>>(a case someone mentioned in this thread) then he can obviously
>>brute force offline, I believe, since he possesses now everything
>>the legitimate user has, excepting the 'remembered secret'. Or is
>>there anything wrong with my logic?
>
>Yes. There is something wrong with you logic.
>
>Bruce
>**********************************************************************
>Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098
>101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590
> Free crypto newsletter. See: http://www.counterpane.com
According to the website, there's no pool of passwords. There's a
truncated hash that will catch most mistakes, but is useless as a test
criterion in a dictionary attack. If you get the user's "public" key,
then you can do a dictionary attack. The user's "public" key isn't
public, however; not even the user knows it. If I'm understanding it
right, it's stored encrypted and the key is only given to a set of
predefined servers. Prior relationship must exist; they admit that.
--
Mike Stay
Cryptographer / Programmer
AccessData Corp.
mailto:[email protected]