[cryptography] Non-governmental exploitation of crypto flaws?
smb at cs.columbia.edu
Mon Nov 28 20:17:37 EST 2011
On Nov 28, 2011, at 7:58 PM, Steven Bellovin wrote:
> On Nov 27, 2011, at 11:00 PM, Peter Gutmann wrote:
>> Steven Bellovin <smb at cs.columbia.edu> writes:
>>> Does anyone know of any (verifiable) examples of non-government enemies
>>> exploiting flaws in cryptography?
>> Could you be a bit more precise about what "flaws in cryptography" covers? If
>> you mean exploiting bad or incorrect implementations of crypto then there's so
>> much that I barely know where to start, if it's actual cryptanalytic attacks
>> on anything other than toy crypto (homebrew ciphers, known-weak keys, etc)
>> then there's very little around. If it's something else, you'd have to let us
>> know where the borders lie.
> Private reply. ...
Very private, I see... I thought I triple-checked the To: line...
Will someone *please* fix this !@#$%^& mailing list and make it *not* install
a Reply-To line?
--Steve Bellovin, https://www.cs.columbia.edu/~smb
More information about the cryptography