Software Smart Cards via Cryptographic Camouflage

  title={Software Smart Cards via Cryptographic Camouflage},
  author={Douglas N. Hoover and B. N. Kausik},
  booktitle={IEEE Symposium on Security and Privacy},
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do not encrypt the private key with a password that is too long for exhaustive attack. Instead, we encrypt it so that only one password will decrypt it correctly, but many passwords will decrypt it to produce a key that looks valid enough to fool an attacker. For certain applications, this method protects a private key… CONTINUE READING
Highly Cited
This paper has 37 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 24 extracted citations


Publications referenced by this paper.
Showing 1-10 of 10 references

Strong passwordonly authenticated ky exchange

  • B. Schneier, D. Wagner, C. Hall
  • Computer Communication Review
  • 1996

Unix password security

  • R. H. Morris, K. Thompson
  • Communications of the ACM,
  • 1979
1 Excerpt

Similar Papers

Loading similar papers…