[colug-432] crypto is not auditable for weaknesses by mere mortals who
R P Herrold
herrold at owlriver.com
Thu Jan 29 14:49:35 EST 2015
... don't think about it all the time
mentioned in passing at the meeting last night, and a pointer
to an example was requested. The requester recently
implemented a TLS implementation for his employer
A recent paper by DJB points this out -- read pgs 1 to 66 [1]
before reading p 67 and ff, but having read the preceeding 66,
do you see the hole? he has worked through all the maths and
given a hint at the exploit that a mitm might use to
(invisibly) compromise (in this example) DH key exchange
-- Russ herrold
[1] http://events.ccc.de/congress/2014/Fahrplan/system/attachments/2501/original/20141227.pdf
I will bury the answer here, Eve, the mistress in the middle,
has radically cut the search, and so your eyes will not pick,
from computationally infeasable to about five thousand
possibilities, out the answer in this mass of text. This is
one by using a circular function, a special case of an elipse
where the two focii are at the same point; circles are
megenerate ellipses, after a fashion. If Bob wants to kiss
Alice he should whisper in her ear instead of sending an email
[2]
[2] https://twitter.com/SwiftOnSecurity/status/560870616497008641
More information about the colug-432
mailing list