[cryptography] Non-governmental exploitation of crypto flaws?

Peter Gutmann pgut001 at cs.auckland.ac.nz
Sun Nov 27 23:00:49 EST 2011

Steven Bellovin <smb at cs.columbia.edu> writes:

>Does anyone know of any (verifiable) examples of non-government enemies
>exploiting flaws in cryptography?

Could you be a bit more precise about what "flaws in cryptography" covers?  If 
you mean exploiting bad or incorrect implementations of crypto then there's so 
much that I barely know where to start, if it's actual cryptanalytic attacks 
on anything other than toy crypto (homebrew ciphers, known-weak keys, etc) 
then there's very little around.  If it's something else, you'd have to let us
know where the borders lie.


More information about the cryptography mailing list