⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 15374

📁 神经网络昆斯林的新闻组分类2006
💻
字号:
Path: cantaloupe.srv.cs.cmu.edu!das-news.harvard.edu!noc.near.net!howland.reston.ans.net!usc!elroy.jpl.nasa.gov!nntp-server.caltech.edu!halFrom: hal@cco.caltech.edu (Hal Finney)Newsgroups: sci.cryptSubject: Re: Clipper chip -- technical detailsDate: 19 Apr 1993 06:25:40 GMTOrganization: California Institute of Technology, PasadenaLines: 19Message-ID: <1qtgl4INNhli@gap.caltech.edu>References: <1993Apr18.200737.14815@ulysses.att.com> <1667.Apr1821.58.3593@silverton.berkeley.edu>NNTP-Posting-Host: alumni.caltech.edudjb@silverton.berkeley.edu (D. J. Bernstein) writes:>[Summary elided]>The system as described here can't possibly work. What happens when>someone plugs the above ciphertext into a receiving chip? To get M>the receiving chip needs K_P; to get K_P the receiving chip needs U_C.>The only information it can work with is C. If U_C can be computed>from C then the system is cryptographically useless and the ``key>escrow'' is bullshit. Otherwise how is a message decrypted?The description of the chip's operation evidently leaves out some of thekey management aspects.  Either the K_P is the secret key correspondingto a public key which is broadcast at message initiation, or it is theresult of a Diffie-Hellman key exchange or something similar.  Eitherway there must be some protocols beyond those described here.  It isn'tclear whether they are implemented in the Clipper wiretap chip or mustbe provided by other system components.Hal Finney

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -