On Wed, 11 Jun 2008 15:58:26 -0400
Jeffrey I. Schiller [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I bet the malware authors can change keys faster then we can factor
them...
To put it mildly. They can can even set up sophisticated structures to
have lots of
On Jun 11, 2008, at 10:04 PM, Steven M. Bellovin wrote:
Let's put it like this: suppose you wanted to use all of your
cryptographic skills to do such a thing. Do you think it could be
cracked? I don't...
Exactly right. After Storm, I don't think anyone reasonable still
believes that
According to
http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9094818intsrc=hm_list%3E%20articleId=9094818intsrc=hm_list
some new malware is encrypting files with a 1024-bit RSA key. Victims
are asked to pay a random to get their files decrypted. So -- can
the key
Steven M. Bellovin wrote:
According to
http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9094818intsrc=hm_list%3E%20articleId=9094818intsrc=hm_list
some new malware is encrypting files with a 1024-bit RSA key. Victims
are asked to pay a random to get their files