ecc question
The ecc discrete log problem is given points A and B, find integer x such that xA=B if it exists. I assume that most crypto implementations of ecc use finite fields; in a finite field can you assume that x exists? -- Mike Stay Cryptographer / Programmer AccessData Corp. mailto:[EMAIL PROTECTED]
Re: bo2k cryptography
The authors have announced and fixed one bug where the keys generated were always the same. Full scrutiny would be advisable before deployment. Bluefish wrote: I've received some questions by email which are beyond my ability to answer. The questions are about the cryptographic strength of the plugin for bo2k (3DES IIRC, see www.bo2k.com and www.cdc.com, down once in a while it seems). If anyone don't know what bo2k is, it's a remote control utility which has caused some discussions regarding ethics which are off topic here... Basicly I wonder if there is any evaluation of how strong the encryption is. I'm aware that that 168 bit is concidered "NSA-secure" and that 3DES is concidered secure, but what about -- 3DES algorithm used correctly? -- Key generation: Good PRNG, Bad PRNG, Good Hash, Bad Hash? And any other subject which might come into mind. //blue
CPU-Controlled Compromising Emanations
Hello, I've compiled a web page with detailed descriptions of my previous findings, of another transmission method and of experiments showing the feasibility of data transmission and recovery using these methods. The address is: http://altern.org/berke/tempest/ -- Berke Durak [EMAIL PROTECTED] PGP 262i F203A409 44780515D0DC5FF1:BBE6C2EE0D1F56A1 Kripto-TR http://gsu.linux.org.tr/kripto-tr/ (in Turkish)
Re: CPU-Controlled Compromising Emanations
I recall seeing programs that would play music (not hi-fi :) on a nearby radio receiver, in 1962. Isn't this what Tempest stuff is all about? Barney Wolff [EMAIL PROTECTED]