Sciweavers

SP
1999
IEEE

Software Smart Cards via Cryptographic Camouflage

14 years 4 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do not encrypt the private key with a password that is too long for exhaustive attack. Instead, we encrypt it so that only one password will decrypt it correctly, but many passwords will decrypt it to produce a key that looks valid enough to fool an attacker. For certain applications, this method protects a private key against dictionary attack, as a smart card does, but entirely in software.
Douglas N. Hoover, B. N. Kausik
Added 04 Aug 2010
Updated 04 Aug 2010
Type Conference
Year 1999
Where SP
Authors Douglas N. Hoover, B. N. Kausik
Comments (0)