[cryptography] Non-governmental exploitation of crypto flaws?

Steven Bellovin smb at cs.columbia.edu
Mon Nov 28 20:17:37 EST 2011


On Nov 28, 2011, at 7:58 PM, Steven Bellovin wrote:

> 
> On Nov 27, 2011, at 11:00 PM, Peter Gutmann wrote:
> 
>> Steven Bellovin <smb at cs.columbia.edu> writes:
>> 
>>> Does anyone know of any (verifiable) examples of non-government enemies
>>> exploiting flaws in cryptography?
>> 
>> Could you be a bit more precise about what "flaws in cryptography" covers?  If 
>> you mean exploiting bad or incorrect implementations of crypto then there's so 
>> much that I barely know where to start, if it's actual cryptanalytic attacks 
>> on anything other than toy crypto (homebrew ciphers, known-weak keys, etc) 
>> then there's very little around.  If it's something else, you'd have to let us
>> know where the borders lie.
>> 
> Private reply. ...

Very private, I see...  I thought I triple-checked the To: line...

Will someone *please* fix this !@#$%^& mailing list and make it *not* install
a Reply-To line?


		--Steve Bellovin, https://www.cs.columbia.edu/~smb








More information about the cryptography mailing list