Re: debugging encrypted part of isakmp

看板FB_security作者時間21年前 (2005/01/21 21:13), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串6/6 (看更多)
on 14.01.2005 17:53 Andriy Gapon said the following: > > I see. I think it should not be too hard theoretically to write a > program that would do such decryption offline, using code from isakmpd > or racoon, and playing for both sides to deduce internal state/random > values that original parties used. But that's definitely a lot of work. > Looks like wrote nonsence and what I wanted was to break Diffie-Hellman exchange or to derive DH shared key using encrypted information and knowing certain parts of original information, both of which are either not feasible or too hard. Sorry for wasting your time. -- Andriy Gapon _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #11yG0800 (FB_security)
文章代碼(AID): #11yG0800 (FB_security)