On 31/03/12 11:14 AM, Jeffrey Walton wrote:
Hi Guys,

I'm aware of two standards where folks fiddled with a scheme and
destroyed its security properties:

* A5/3 based on Kasumi used in GSM networks
* EAX' (EAX Prime) based on EAX mode

Are there any other spectacular failures that come to mind?


Debian optimisation of input to TLS code?

Possibly XOR related adventures, or RNGs.

Sound like a good enquiry for an article.


iang
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to