Generating keys from radio echoes
From http://www.h-online.com/security/new...es-946643.html
Quote:
Generating the shared secrets required for cryptographic tasks does not necessarily require the use of mathematical functions such as prime factorisation or elliptic curves.
In hall 9, stand A02/1 at CeBIT, researchers at the Karlsruhe Institute of Technology (KIT) are demonstrating how the characteristics of a radio connection can be used instead.
|
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
|