[E-voting] encryption compromised by hardware
tim at birdsnest.maths.tcd.ie
Mon Nov 20 14:22:36 GMT 2006
On Monday 20 November 2006 13:50, Michael McMahon wrote:
> Also, if you consider that encryption and decryption keys have to exist
> in computer
> memory in order for them to be used, and that privileged software is
> able to access
> memory used by other programs, then that implies that
> encryption/decryption keys can
> (in theory at least) be compromised.
But the encryption does not have to be done
on the machine containing the encrypted data.
However, I don't entirely disagree with you.
e-mail (<80k only): tim /at/ birdsnest.maths.tcd.ie
tel: +353-86-2336090, +353-1-2842366
s-mail: School of Mathematics, Trinity College, Dublin 2, Ireland
More information about the E-voting