Re: CIA - the cryptographer's intelligent aid?

2004-01-07 Thread Anton Stiglic
The thing about CIA is that it is commonly used in security (not
cryptography)
courses to mean Confidentiality, Integrity (of systems) and Availability
(instead
of Authentication).  Availability of systems, services and information.

For crypto I always talked about CAIN or PAIN (like in no PAIN
no gain, or cryptography is allot of PAIN).  -- note, I also prefer the word
Confidentiality over Privacy, the latter being to high level and I usually
reserve
it to mean the hiding of who is communicating with who (anonymity
systems...).

When introducing digital signatures I always state that they provide
integrity
(as do MACs, which I introduce beforehand) but also the possibility of
non-repudiation.  And then I go on stating that it is very hard, if not
impossible,
to in fact implement non-repudiation.

--Anton


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Any good books or URLs for WinXP crypto security?

2004-01-07 Thread Anton Stiglic
NSA Windows hardening guides:
http://nsa2.www.conxion.com/

--Anton

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


FC'04: 2nd Call for Participation

2004-01-07 Thread Hinde ten Berge
Financial Cryptography '04
9-12 February 2004
  Key West, Florida, USA


2nd Call for Participation

Note: Early registration ends on January 9th, 2004!

Financial Cryptography is the premier international
forum for education, exploration, and debate at the
heart of one theme: Money and trust in the digital
world. Dedicated to the relationship between cryptography
and data security and cutting-edge financial and payment
technologies and trends, the conference brings together
top data-security specialists and scientists with
economists, bankers, implementers, and policy makers.

Financial Cryptography includes a program of invited
talks, academic presentations, technical demonstrations,
and panel discussions. These explore a range of topics
in their full technical and interdisciplinary complexity:
Emerging financial instruments and trends, legal
regulation of financial technologies and privacy issues,
encryption and authentication techologies, digital cash,
and smartcard payment systems -- among many others.

The conference proceedings containing all accepted
submissions will be published in the Springer-Verlag
Lecture Notes in Computer Science (LNCS) series after
the conference. A pre-proceedings containing preliminary
versions of the papers will be distributed at the
conference.

FC'04 Keynote Speakers:

Jack Selby- The Failure of eCash: New solutions,
same old problems

Ron Rivest- title to be announced

Jacques Stern - Cryptography and French banking cards:
past, present, future

Simon Pugh- Security  Risk Management of
Transactions for Paypass

Jon Peha  - Bringing Payment Technology to the
Unbanked

More detailed information on the invited speakers is
available on the web site, as well as the list of accepted
papers and the preliminary schedule.

Registration for Financial Cryptography 2004 is open;
details and online registration can be found at
http://fc04.ifca.ai along with information about
discounted hotel accommodation and travel. Early
registration ends on January 9th, 2004!

Financial Cryptography is organized by the International
Financial Cryptography Association (IFCA). More
information can be obtained from the IFCA web site at
http://www.ifca.ai or by contacting the conference
general chair, Hinde ten Berge, at [EMAIL PROTECTED]








-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RE: Walton's Mountain notaries (identity requirements)

2004-01-07 Thread Carl Ellison
 -Original Message-
 From: John Gilmore [mailto:[EMAIL PROTECTED] 
 Sent: Monday, January 05, 2004 3:11 PM
 To: Carl Ellison
 Cc: 'Paul A.S. Ward'; [EMAIL PROTECTED]
 Subject: Re: Walton's Mountain notaries (identity requirements)
 
   ... once again I heard the readings about the
  edict from Caesar that all people return to their home towns to be
counted
  in a census.  Maybe we can take a lesson from that - and have everyone
  return to people who have known the person, uninterrupted, from birth to
the
  present in order to get anything notarized.  Anyone who couldn't find
such
  people just couldn't get anything notarized, I guess.
 
 It's a lot more complicated than that, Carl.  Society can't demand
impossible
 conditions from its citizens, as a precondition to existence.  (This is
 true even if the condition is possible for 99% of the citizens; the other
 1% have rights too.)

Hi John.

Of course it shouldn't.  I was using that extreme example to drive home the
point that the concept of identity (via notary, in this case) has been
eroded out from under us and we don't have anything to replace it with.  My
guess is that a good replacement will not provide traceability but will meet
our needs (for reputation). However, it's up to people like us to design
that replacement.

 - Carl

+--+
|Carl M. Ellison [EMAIL PROTECTED]  http://theworld.com/~cme |
|PGP: 75C5 1814 C3E3 AAA7 3F31  47B9 73F1 7E3C 96E7 2B71   |
+---Officer, arrest that man. He's whistling a copyrighted song.---+ 
 

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: [Fwd: Re: Non-repudiation (was RE: The PAIN mnemonic)]

2004-01-07 Thread Jerrold Leichter
Now that we've trashed non-repudiation ... just how is it different from
authentication?  In both cases, there is a clear technical meaning (though as
with anything in mathematics, when you get right down to it, the details are
complex and may be important):  To produce an authenticator/non-repudiable
signature, you must have access to the secret.  There isn't, at this level,
even any difference between the requirements for the two.  Where we get into
trouble is in attempting to bind the real world to the mathematics.  In each
case, the receiver wants to be able to say:

 1. I can rely on the fact that X sent me this data, because it came
with a signature that could be calculated only by X.

What he *really* needs to say is:

 2. I can rely on the fact that X sent me this data, because it came
with a signature that could be calculated only by someone knowing X's
secret.

To go from 2 to 1, the receiver must also have:

 3. I can rely on the fact that only X knows X's secret.

In ordinary English usage, there is little difference between I've authenti-
cated this message as coming from X and X can't deny that he wrote this
message.  We've learned that non-repudiation is a concept with relatively
little use in the legal system.  However, authentication (of a signature,
document, whatever) is quite common (even if for the usual kinds of objects
that need authentication, there is generally little to discuss).  If the
ultimate question is whether, as a legal matter, X is bound by some writing
or whatever, authentication gets at the same basic question (which is only
part, usually a small part, of the relevant legal issues).

The problems that we've been discussion here are clear from 2 and 3:

- Rely on is inherently outside of the cryptography or mathematics.
It's only meaningful to the extent that there is some recourse
(generally through agreements, but ultimately through the legal
system) if you rely on something that turns out not be what
you thought it was.

- We identify X with an individual, but in fact X rarely knows
the secret personally, and never does the actual calculations -
some code running in some real physical machine does the work.

So in fact we can't even begin to get 3; at best, we have:

3'. I can rely on the fact that, if X has shared his secret with Y (where
Y is typically some equipment), then I can rely on X to be bound by
whatever Y does.

This is now so bizarre and removed from ordinary notions that it should be
clear why it's unlikely be of much real-world use!

-- Jerry

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]