[cryptography] Non-governmental exploitation of crypto flaws?

James A. Donald jamesd at echeque.com
Mon Nov 28 21:50:04 EST 2011


On 2011-11-28 2:00 PM, Peter Gutmann wrote:
> Steven Bellovin<smb at cs.columbia.edu>  writes:
>
>> Does anyone know of any (verifiable) examples of non-government enemies
>> exploiting flaws in cryptography?
>
> Could you be a bit more precise about what "flaws in cryptography" covers?  If
> you mean exploiting bad or incorrect implementations of crypto then there's so
> much that I barely know where to start, if it's actual cryptanalytic attacks
> on anything other than toy crypto (homebrew ciphers, known-weak keys, etc)
> then there's very little around.

The various wifi breaks are reasonably described as actual cryptanalytic 
attacks.



More information about the cryptography mailing list