On Sun, Nov 27, 2011 at 3:10 PM, Steven Bellovin <s...@cs.columbia.edu> wrote:
> Does anyone know of any (verifiable) examples of non-government enemies
> exploiting flaws in cryptography?  I'm looking for real-world attacks on
> short key lengths, bad ciphers, faulty protocols, etc., by parties other
> than governments and militaries.  I'm not interested in academic attacks
> -- I want to be able to give real-world advice -- nor am I looking for
> yet another long thread on the evils and frailties of PKI.
>
"In July 2009, Benjamin Moody, a United-TI forum user, published the
factors of a 512-bit RSA key used to sign the TI-83+ series graphing
calculator....",
http://en.wikipedia.org/wiki/Texas_Instruments_signing_key_controversy.
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to