[29701] in cryptography@c2.net mail archive
Re: Use of TPM chip for RNG?
daemon@ATHENA.MIT.EDU (Anne & Lynn Wheeler)
Tue Jul 4 23:20:48 2006
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 04 Jul 2006 10:53:11 -0600
From: Anne & Lynn Wheeler <lynn@garlic.com>
To: "Travis H." <solinym@gmail.com>
Cc: Peter Gutmann <pgut001@cs.auckland.ac.nz>,
cryptography@metzdowd.com, hal@finney.org
In-Reply-To: <d4f1333a0607031109u6ea9f005ia0ef9cd23b53ab8b@mail.gmail.com>
Travis H. wrote:
> http://www.usenix.org/publications/library/proceedings/smartcard99/technical.html
>
> http://www.usenix.org/publications/library/proceedings/cardis02/tech.html
and even this ... having to resort to the wayback machine
http://web.archive.org/web/20030417083810/http://www.smartcard.co.uk/resources/articles/cartes2002.html
includes mention of "yes card" attack (end of last paragraph). however,
the "yes card" attack is really an attack on the terminals (and the
infrastructure implementation) ... not on cards. a few posts discussing
"yes card"
http://www.garlic.com/~lynn/aadsm24.htm#1 UK Detects Chip-AND-Pin
Security Flaw
http://www.garlic.com/~lynn/aadsm24.htm#14 Naked Payments IV
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com