[87419] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: AACS and Processing Key

daemon@ATHENA.MIT.EDU (Steve Schear)
Fri May 4 09:51:48 2007

Date: Wed, 02 May 2007 21:50:22 -0700
To: cryptography@metzdowd.com
From: Steve Schear <s.schear@comcast.net>
In-Reply-To: <877irr2i13.fsf@snark.piermont.com>

At 11:32 AM 5/2/2007, Perry E. Metzger wrote:

>Anyone very familiar with AACS have ideas on what optimal attack and
>defense strategies are? This seems like a fertile new ground for
>technical discussion.

Ed Felton wrote and excellent piece on AACS from the technical and 
economic/tactical standpoint.  This link is to the part that addresses your 
particular question:
http://www.freedom-to-tinker.com/?p=1107

Steve 

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post