[E-voting] encryption compromised by hardware

Timothy Murphy tim at birdsnest.maths.tcd.ie
Mon Nov 20 14:22:36 GMT 2006


On Monday 20 November 2006 13:50, Michael McMahon wrote:

> Also, if you consider that encryption and decryption keys have to exist
> in computer
> memory in order for them to be used, and that privileged software is
> able to access
> memory used by other programs, then that implies that
> encryption/decryption keys can
> (in theory at least) be compromised.

But the encryption does not have to be done
on the machine containing the encrypted data.

However, I don't entirely disagree with you.

-- 
Timothy Murphy  
e-mail (<80k only): tim /at/ birdsnest.maths.tcd.ie
tel: +353-86-2336090, +353-1-2842366
s-mail: School of Mathematics, Trinity College, Dublin 2, Ireland



More information about the E-voting mailing list