As a hack, at the height of the crypto export insanity, people made a T shirt with RSA on it. 3 lines of perl.
http://en.wikipedia.org/wiki/Illegal_T-shirt The biggest challenge is it likes multi-precision arithmetic. You can still buy them: http://www.cafepress.com/buy/rsa/-/pv_design_prod/p_storeid.3721214/pNo_3721214/id_1534535/opt_/pg_/c_/fpt_ - Jim On Sun, 2006-08-27 at 19:31 -0500, Richard Smith wrote: > > > a) How does the verification happen ? This is where the > > > vulnerability will be. > > > > Small binary within the LB payload that uses standard crypto signature > > verification. This part can be assumed fully secure, as long as we ship > > the machines with a known-good BIOS, which we obviously will. > > I was under the impression that the public key based crypto code is > pretty large. Due to the tables used. Will the small binary really be > small? > -- Jim Gettys One Laptop Per Child _______________________________________________ Devel mailing list [email protected] http://mailman.laptop.org/mailman/listinfo/devel
