View Single Post
  #1   (View Single Post)  
Old 4th March 2010
J65nko J65nko is offline
Administrator
 
Join Date: May 2008
Location: Budel - the Netherlands
Posts: 4,128
Default Generating keys from radio echoes

From http://www.h-online.com/security/new...es-946643.html

Quote:
Generating the shared secrets required for cryptographic tasks does not necessarily require the use of mathematical functions such as prime factorisation or elliptic curves.

In hall 9, stand A02/1 at CeBIT, researchers at the Karlsruhe Institute of Technology (KIT) are demonstrating how the characteristics of a radio connection can be used instead.
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
Reply With Quote