...despite all the attacks we've seen on compresion-before-encryption, and all the timing atatacks we've seen on encryption, and the highly data-dependent computational effort associated with compression (including in widespread, hardware-accelerated, and valuable applications like lossy video compression, where the complexity of the input, even in applications where hardware escrow of some kind hides a session key, is exposed by the encoding of the output)...
..we haven't really seen any known-plaintext key recovery attacks facilitated by timing analysis of compressors applied prior to encryption? -- Thor Lancelot Simon [email protected] It's very complicated. It's very cumbersome. There's a lot of numbers involved with it. _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
