[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Smart card attacks vs. clipper?



Has any work been done (yet) using the recently-publicised techniques
used to foil smart card tamperproofing against Clipper implementations?

Seems like it's a bit of a different story, since in the Clipper's
case the algorithm is (ostensibly) unknown, but I'm just curious as
to whether there is some compromise of its security-through-obscurity.
-- 
______c_________________________________________________________________
Mike M Nally * IBM % Tivoli * Austin TX  * How quickly we forget that
mailto:[email protected] mailto:[email protected]  * "deer processing" and "data
http://www.io.com/~m101/                 * processing" are different!