[cryptography] Non-governmental exploitation of crypto flaws?
pgut001 at cs.auckland.ac.nz
Sun Nov 27 23:00:49 EST 2011
Steven Bellovin <smb at cs.columbia.edu> writes:
>Does anyone know of any (verifiable) examples of non-government enemies
>exploiting flaws in cryptography?
Could you be a bit more precise about what "flaws in cryptography" covers? If
you mean exploiting bad or incorrect implementations of crypto then there's so
much that I barely know where to start, if it's actual cryptanalytic attacks
on anything other than toy crypto (homebrew ciphers, known-weak keys, etc)
then there's very little around. If it's something else, you'd have to let us
know where the borders lie.
More information about the cryptography