Secure digital transactions just got a little less secure
Article Abstract:
A paper by researcher Paul C. Kocher states that a determined hacker could figure out the private key for a message sent using public-key encryption in a few minutes and using only a good PC. In public-key encryption, a coded message is deciphered using a key known only to the recipient. The report states that a hacker could repeatedly record the exact amount of time each unscrambling requires, then use the time data to determine the private key. An analogous undertaking would have a burglar observe the time it takes for people to enter the security code for a push-button combination lock, then use the accumulated data to reduce the number of potential combinations that could be used in the recorded time span. Other experts agree that Kocher's findings are valid, while others find them more likely in theory than practice. The problem can be addressed in new systems by adding unnecessary steps that increase the unscrambling time.
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1995
User Contributions:
Comment about this article or add new information about this topic:
Export laws challenged by sale of encryption software abroad
Article Abstract:
Network Associates announced that it will permit its Dutch subsidiary, Network Associates International, to begin selling an international version of its Pretty Good Privacy encryption program. The leading independent US computer security software maker's move would bypass government export policies that require encryption software to contain back doors for law enforcement surveillance. A battle over data scrambling already is taking place between the Clinton Administration and Congress, which says this method of restricting encryption software will damage the US industry's ability to compete internationally. Network Associates' move represents the biggest challenge to the Commerce Department's policy, according to the Forrester Group. The Clinton Administration says building back doors into encryption software allows law enforcement officials to secretly decode private messages.
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1998
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Microsoft's accounting under scrutiny. Data-secrecy export case dropped by U.S
- Abstracts: Advanced Micro introduces a faster chip. Intel net soars on the demand for Pentium; results are seen as sign of vigor in PC business
- Abstracts: The three phases of implementation. How to make software proposal cost comparisons. How to choose a financial software consultant
- Abstracts: Bosnian combatants sign peace treaty in Paris; NATO peace force deployment set in motion. Clinton accepts '96 defense spending bill
- Abstracts: Judges turn back law to regulate Internet decency; free speech case; ruling by panel moves the First Amendment into a new era