lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.61.0411191031240.5645@catbert.rellim.com>
From: gem at rellim.com (Gary E. Miller)
Subject: Time Expiry Alogorithm??

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yo Gautum!

On Fri, 19 Nov 2004, Gautam R. Singh wrote:

> I was just wondering is there any encrytpion alogortim which expires wit
> h time.

IPSec, kerboros, etc. all use time as part of the auto-generated session
key to prevent playback attacks.

If a black hat has an intercepted message he wants to decode then he can
set his clock to anything he wants to.  Time is no help there, except
to expand the key search space if they are looking for an unknown key.
If they have the key already nothing you can do if they can reset their
clock.

All that time gets you is protection from replays.

RGDS
GARY
- ---------------------------------------------------------------------------
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
	gem@...lim.com  Tel:+1(541)382-8588 Fax: +1(541)382-8676

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFBnj458KZibdeR3qURAhRrAKCmRRsEOWNYysATUTetYkc0ldoZtACeIM5h
aYw7P4ACKK0dqhJhivG1lYE=
=JwrG
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ