Re: [cryptography] Detecting Crypto Compromises

2012-04-03 Thread Jürgen Brauckmann
Am 31.03.2012 04:23, schrieb Landon Hurley: Does anyone have any knowledge of academic papers focused on methods of detecting whether a crypto scheme has been compromised in situ or on how to utilize intelligence gleaned from compromised cipher texts without giving away that compromise to the

Re: [cryptography] Detecting Crypto Compromises

2012-03-31 Thread Eitan Adler
On 30 March 2012 22:23, Landon Hurley ljrhur...@gmail.com wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Does anyone have any knowledge of academic papers focused on methods of detecting whether a crypto scheme has been compromised in situ or on how to utilize intelligence gleaned

[cryptography] Detecting Crypto Compromises

2012-03-30 Thread Landon Hurley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Does anyone have any knowledge of academic papers focused on methods of detecting whether a crypto scheme has been compromised in situ or on how to utilize intelligence gleaned from compromised cipher texts without giving away that compromise to the

Re: [cryptography] Detecting Crypto Compromises

2012-03-30 Thread ianG
On 31/03/12 13:23 PM, Landon Hurley wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Does anyone have any knowledge of academic papers focused on methods of detecting whether a crypto scheme has been compromised in situ or on how to utilize intelligence gleaned from compromised cipher

Re: [cryptography] Detecting Crypto Compromises

2012-03-30 Thread dan
I'm thinking in terms of scenarios like how could the Nazis have methodologically shown Enigma's compromise in a systematic manner; the converse as well though: has there been research into scenarios similar to the Allies and Enigma (i.e. how to not give the game away), or has it all just