diff options
author | Darren Tucker <dtucker@zip.com.au> | 2008-06-13 04:40:35 +1000 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2008-06-13 04:40:35 +1000 |
commit | 9c16ac926376ad87084ae78bac44a813ae5db21f (patch) | |
tree | 438b335d17d91d45c9c77fba9339816b2bf2dbf9 /ChangeLog | |
parent | 1199673393661ceafc3141e5df43c53e9acdba2f (diff) |
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
sshconnect.c]
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 23 |
1 files changed, 22 insertions, 1 deletions
@@ -3,6 +3,27 @@ | |||
3 | - jmc@cvs.openbsd.org 2008/06/11 07:30:37 | 3 | - jmc@cvs.openbsd.org 2008/06/11 07:30:37 |
4 | [sshd.8] | 4 | [sshd.8] |
5 | kill trailing whitespace; | 5 | kill trailing whitespace; |
6 | - grunk@cvs.openbsd.org 2008/06/11 21:01:35 | ||
7 | [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c | ||
8 | sshconnect.c] | ||
9 | Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the | ||
10 | graphical hash visualization schemes known as "random art", and by | ||
11 | Dan Kaminsky's musings on the subject during a BlackOp talk at the | ||
12 | 23C3 in Berlin. | ||
13 | Scientific publication (original paper): | ||
14 | "Hash Visualization: a New Technique to improve Real-World Security", | ||
15 | Perrig A. and Song D., 1999, International Workshop on Cryptographic | ||
16 | Techniques and E-Commerce (CrypTEC '99) | ||
17 | http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf | ||
18 | The algorithm used here is a worm crawling over a discrete plane, | ||
19 | leaving a trace (augmenting the field) everywhere it goes. | ||
20 | Movement is taken from dgst_raw 2bit-wise. Bumping into walls | ||
21 | makes the respective movement vector be ignored for this turn, | ||
22 | thus switching to the other color of the chessboard. | ||
23 | Graphs are not unambiguous for now, because circles in graphs can be | ||
24 | walked in either direction. | ||
25 | discussions with several people, | ||
26 | help, corrections and ok markus@ djm@ | ||
6 | 27 | ||
7 | 20080611 | 28 | 20080611 |
8 | - (djm) [channels.c configure.ac] | 29 | - (djm) [channels.c configure.ac] |
@@ -4165,4 +4186,4 @@ | |||
4165 | OpenServer 6 and add osr5bigcrypt support so when someone migrates | 4186 | OpenServer 6 and add osr5bigcrypt support so when someone migrates |
4166 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ | 4187 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ |
4167 | 4188 | ||
4168 | $Id: ChangeLog,v 1.4968 2008/06/12 18:32:00 dtucker Exp $ | 4189 | $Id: ChangeLog,v 1.4969 2008/06/12 18:40:35 dtucker Exp $ |