In article CAH8yC8k14FQ1krr9F-uj_mMeirQWWQgR2=0d8jf6y2aimjd...@mail.gmail.com
you write:
http://www.prnewswire.com/news-releases/geotrust-launches-georoot-allows-organizations-with-their-own-certificate-authority-ca-to-chain-to-geotrusts-ubiquitous-public-root-54048807.html
Ten seconds of
Hi ! Which lightweight algorithms are vulnerable against slide attack?
Specifically, can we use the slide attack to Tiny encryption algorithm(TEA)
or PRESENT?
Thanks already for all responses .
___
cryptography mailing list
cryptography@randombit.net
Nope.
Slide attack and reflection attacks are only possible if there's a certain
symmetry in the key schedule. TEA has a lousy key schedule, but it is not
symmetrical. Neither is PRESENT.
Question: if I were to see the ciphertext being processed under a slide
attack, what would it look like? A
On Sun, Apr 5, 2015 at 6:25 PM, ITechGeek i...@itechgeek.com wrote:
So does this mean Iran the like can stop hacking CAs and buy their own
Geotrust cert to MITM their population?
Yeah, its been around for a while. What's surprising is (or maybe not)
is the CA is still not constraining the
I think that press release is years old. GeoTrust was bought by VeriSign
years ago who was then bought by Symantec.
This kind of agreement now requires the subordinate to be audited to the
same standards as all other public CAs.
On Apr 5, 2015 3:03 PM, Jeffrey Walton noloa...@gmail.com wrote:
Good catch - it would seem 10 years old to be exact:
http://www.hostreview.com/news/050215geotrust.html
On Mon, Apr 6, 2015 at 10:30 AM, Peter Bowen pzbo...@gmail.com wrote:
I think that press release is years old. GeoTrust was bought by VeriSign
years ago who was then bought by Symantec.