Jonathan Katz wrote:
On Mon, 5 May 2008, Ariel Waissbein wrote:
[Moderator's note: Again, top posting is discouraged, and not editing
quoted material is also discouraged. --Perry]
Hi list,
Interesting. Great work! I had been looking *generic* predicate
encryption for some time
algorithms and require assuming only the
existence of IND-CPA secure symmetric ciphers. In [2] we came up with
more applications other than sofprot;)
[1] Diego Bendersky, Ariel Futoransky, Luciano Notarfrancesco, Carlos
Sarraute and Ariel Waissbein. Advanced Software Protection Now. Core
Security
present an attack that allows you to send arbitrary
data on a WEP network after having eavesdropped a
single data packet!! Next, communicate with every host in the router's
LAN. And finally decrypt packets in real-time.
Ariel
--
Ariel Waissbein
CORE SECURITY TECHNOLOGIES
http://www.coresecurity.com
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
--
Ariel Waissbein
RESEARCHER
CORE SECURITY TECHNOLOGIES
Tel./Fax: (54-11) 5556-2673
Humboldt 1967, 2do piso
Capital Federal,
Argentina
http
Hi,
Please notice that a second distress password becomes useless if the
would-be user of this password has access to the binaries (that is, the
encrypted data), e.g., because he will copy them before inserting the
password and might even try to reverse-engineer the decryption software
before
and checksum16.
Regards,
Ariel
vlastimil.klima wrote:
The trick could be shortly expressed as follows:
Give me three files and I will give you another three with the
same MD5 hash
--
Ariel Waissbein
RESEARCHER
CORE SECURITY TECHNOLOGIES
http://www.coresecurity.com/corelabs
Fischer ``The Thought Gang
Ariel Waissbein
RESEARCHER
CORE SECURITY TECHNOLOGIES
http://www.coresecurity.com/corelabs
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Is there really that much space for marking? Any substantial number of
marked bits will become obvious in the output stream, no?
Is the watermarking system robust? Is it public? And how long ago has
it been published?
If they are only modifying some bits (in the standard representation),
then