> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On
> Behalf Of McMechan, James
> Sent: Wednesday, January 23, 2002 1:20 AM
> To: [EMAIL PROTECTED]
> Subject: RE: MUSCLE smartcard security hacks
>
>
> If a person having the card and a valid PIN number wants to extract the
> secret keys it is hard to prevent them from doing so since any number of
> chosen plaintext attacks can be run. If someone has only the card without
> the PIN it is much much harder in a well designed card.
Excuse me, but I have a slightly different opinion.
The amount of known/cipher text that is needed to perform a successful
attack against RSA is such a big that the entire age of universe is not
enough to perform the attack even with the fastest smart card.
To find a proper references that "proof" the words above is left as an
exercise to the reader ;)
Vesa
Vesa Suontama <[EMAIL PROTECTED]> Tel: +358-40-700 0131
Fax: +358-9-8565 7151
SSH Communications Security Corp Fredrikinkatu 42
http://www.ssh.com FIN-00100 Helsinki, Finland
***************************************************************
Unix Smart Card Developers - M.U.S.C.L.E.
(Movement for the Use of Smart Cards in a Linux Environment)
http://www.linuxnet.com/
To unsubscribe send an email to [EMAIL PROTECTED] with
unsubscribe sclinux
***************************************************************