The Cambridge hacking scene is always producing awesome papers. Here is an attack on ATM machines. As a rule, and the reason digital signature schemes involve hashes, is that you should never provide bad guys with a way to give you data to encrypt. Extracting a 3DES key from an IBM 4758 |