lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: gem at rellim.com (Gary E. Miller) Subject: Time Expiry Alogorithm?? -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yo Gautum! On Fri, 19 Nov 2004, Gautam R. Singh wrote: > I was just wondering is there any encrytpion alogortim which expires wit > h time. IPSec, kerboros, etc. all use time as part of the auto-generated session key to prevent playback attacks. If a black hat has an intercepted message he wants to decode then he can set his clock to anything he wants to. Time is no help there, except to expand the key search space if they are looking for an unknown key. If they have the key already nothing you can do if they can reset their clock. All that time gets you is protection from replays. RGDS GARY - --------------------------------------------------------------------------- Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701 gem@...lim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQFBnj458KZibdeR3qURAhRrAKCmRRsEOWNYysATUTetYkc0ldoZtACeIM5h aYw7P4ACKK0dqhJhivG1lYE= =JwrG -----END PGP SIGNATURE-----
Powered by blists - more mailing lists