> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On
> Behalf Of McMechan, James
> Sent: Wednesday, January 23, 2002 1:20 AM
> To: [EMAIL PROTECTED]
> Subject: RE: MUSCLE smartcard security hacks
>
>
> If a person having the card and a valid PIN number wants to extract the
> secret keys it is hard to prevent them from doing so since any number of
> chosen plaintext attacks can be run.  If someone has only the card without
> the PIN it is much much harder in a well designed card.

Excuse me, but I have a slightly different opinion.

The amount of known/cipher text that is needed to perform a successful
attack against RSA is such a big that the entire age of universe is not
enough to perform the attack even with the fastest smart card.

To find a proper references that "proof" the words above is left as an
exercise to the reader ;)

Vesa

 Vesa Suontama <[EMAIL PROTECTED]>     Tel: +358-40-700 0131
                                     Fax: +358-9-8565 7151
 SSH Communications Security Corp    Fredrikinkatu 42
 http://www.ssh.com                  FIN-00100 Helsinki, Finland


***************************************************************
Unix Smart Card Developers - M.U.S.C.L.E.
(Movement for the Use of Smart Cards in a Linux Environment)
http://www.linuxnet.com/
To unsubscribe send an email to [EMAIL PROTECTED] with
unsubscribe sclinux
***************************************************************

Reply via email to