ecc question

1999-08-23 Thread staym

The ecc discrete log problem is given points A and B, find integer x
such that xA=B if it exists.  I assume that most crypto implementations
of ecc use finite fields; in a finite field can you assume that x
exists?
-- 
Mike Stay
Cryptographer / Programmer
AccessData Corp.
mailto:[EMAIL PROTECTED]



Re: bo2k cryptography

1999-08-23 Thread mischief

The authors have announced and fixed one bug where the keys
generated were always the same. Full scrutiny would be advisable
before deployment.

Bluefish wrote:
 
 I've received some questions by email which are beyond my ability to
 answer. The questions are about the cryptographic strength of the plugin
 for bo2k (3DES IIRC, see www.bo2k.com and www.cdc.com, down once in a
 while it seems). If anyone don't know what bo2k is, it's a remote control
 utility which has caused some discussions regarding ethics which are off
 topic here...
 
 Basicly I wonder if there is any evaluation of how strong the encryption
 is. I'm aware that that 168 bit is concidered "NSA-secure" and that 3DES
 is concidered secure, but what about
 
   -- 3DES algorithm used correctly?
   -- Key generation: Good PRNG, Bad PRNG, Good Hash, Bad Hash?
 
 And any other subject which might come into mind.
 
 //blue





CPU-Controlled Compromising Emanations

1999-08-23 Thread Berke Durak

Hello,

I've compiled a web page with detailed descriptions of my previous
findings, of another transmission method and of experiments showing
the feasibility of data transmission and recovery using these methods.

The address is:

http://altern.org/berke/tempest/

-- 
Berke Durak [EMAIL PROTECTED]
PGP 262i F203A409 44780515D0DC5FF1:BBE6C2EE0D1F56A1
Kripto-TR http://gsu.linux.org.tr/kripto-tr/ (in Turkish)



Re: CPU-Controlled Compromising Emanations

1999-08-23 Thread Barney Wolff

I recall seeing programs that would play music (not hi-fi :) on a nearby
radio receiver, in 1962.  Isn't this what Tempest stuff is all about?

Barney Wolff  [EMAIL PROTECTED]