transactions doesn't enable a crook to initiate a
fraudulent payment transaction.
--
Anne Lynn Wheelerhttp://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
-
The Cryptography Mailing List
Lynn Wheelerhttp://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
significant additional CPU processing load.
--
Anne Lynn Wheelerhttp://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe
that don't have their
own mechanism for detecting replay/repeats and are relying on SSL.
I would also contend that this is significantly smaller exposure than
self-signed certificates.
--
Anne Lynn Wheelerhttp://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn
).
--
Anne Lynn Wheelerhttp://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
, is that with generic
webserver (making the connection) there might be a couple levels of
indirection between the webserver specifying the connection parameters and
the actual server application (leading to webservers always specifying
replay challenge option).
--
Anne Lynn Wheelerhttp
authentication protocol is just another example
(like the purchasse order example) of the higher level protocol having its
own replay/repeat handling infrastructure (whether it is something like log
checking or its own replay challenge).
--
Anne Lynn Wheelerhttp://www.garlic.com/~lynn
at home)
--
Anne Lynn Wheelerhttp://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
#14 Home mainframes
http://www.garlic.com/~lynn/2003c.html#52 diffence between itanium and alpha
--
Anne Lynn Wheelerhttp://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
.
--
Anne Lynn Wheelerhttp://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
of attack on the secret key
2) doesn't affect brute force attack on the derived key
3) makes it harder to use a lost/stolen card
--
Anne Lynn Wheelerhttp://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
://www.garlic.com/~lynn/2002f.html#22 Biometric Encryption: the
solution for network intruders?
--
Anne Lynn Wheelerhttp://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
-
The Cryptography
instruction count instead of timer
http://www.garlic.com/~lynn/2002l.html#28 Two questions on HMACs and hashing
--
Anne Lynn Wheeler [EMAIL PROTECTED], http://www.garlic.com/~lynn/
-
The Cryptography Mailing List
Unsubscribe
Backdoor in AES ?
http://www.garlic.com/~lynn/2002m.html#10 Backdoor in AES ?
--
Anne Lynn Wheeler [EMAIL PROTECTED], http://www.garlic.com/~lynn/
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe
14 matches
Mail list logo