these infrastructures use secret keys .... especially derived secret keys ... that are designed to protect the infrastructure from various kinds of attacks by others (including the people that posses the card) ... typically fraudulent value substitution on the card.
--
Anne & Lynn Wheeler http://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
--------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]