Re: What is currently happening to http://www.cryptome.org/ ?

2001-02-07 Thread Axel H Horns

On 7 Feb 2001, at 10:18, I wrote:

 What is currently happening to
 
   http://cryptome.org/
 
 Since last night I only get
 
 "Forbidden  - You do not have permission to access the requested file
 on this server."
 
 Does anyone know whether the site has been taken down?
 
 Axel H Horns

It looks as if my ISP (T-Online, TOL) is blocked locally by JY for 
whatever reasons. Other ISPs seem not to be affected.  

--AHH




Re: any IDEA licensees out there?

2000-12-10 Thread Axel H Horns

On 8 Dec 2000, at 20:41, Rodney Thayer wrote:

 I tried contacting Ascom about licensing IDEA.  I've got no
 response.  Any licensees out there would be willing to
 tell me who they're talking to?

In 1998 I ordered one IDEA end user license (USD 15,--) by using a 
web form under

http://www.ascom.ch/systec/security/Policy/idea_olof.html

I got some "IDEA USER REGISTRATION CARD" via snail mail to be 
returned to ASCOM. It looks as if this URL would not work anymore.

Regards,

Axel H Horns
Patentanwalt
--
Patentanwalt Axel H Horns[EMAIL PROTECTED]
Voice ++49.89.30630112  Fax ++49.89.30630113
My PGP RSA Key is available, ID = 0xD8433289
PGP C5D2 5E53 D241 4988  17E4 904D 9467 31BC




[FYI] Electronic filing of European patent applications and subsequent documents

2000-12-08 Thread PA Axel H Horns

[I would be interested on any comments on the issue whether or not 
this technical concept is really *sound* from computer security view; 
see the spec link indicated below.   --AHH]


http://www.european-patent-office.org/epo/president/e/2000_12_07_e.htm

-- CUT ---

Decision of the President of the European Patent Office dated 7 
December 2000 on the electronic filing of European patent 
applications and subsequent documents  

The President of the European Patent Office (EPO), having regard to 
Rules 24(1), 27a, 35(2), 36(5), 77(2)(d) and 101 EPC, having regard 
to the basic requirements to be fulfilled by any electronic record, 
namely 

(a) authenticity - ie confirmation that a document is what it 
purports to be, and was authored by the person who purports to have 
done so, 

(b) integrity - ie consistency of the data and, in particular, 
detecting and preventing its unauthorised alteration or destruction, 

(c) confidentiality - ie ensuring that a document's existence or 
content is not disclosed to unauthorised persons, and 

(d) non-repudiation - ie ensuring that the sender (with the 
recipient's co-operation) has reliable evidence that the data has 
been delivered, and that the recipient has reliable evidence of the 
identity of the sender, so that neither party can successfully deny 
sending or receiving the data and a third party can verify its 
integrity and origin,  

having regard to the basic standards of electronic records 
management, namely that  

[...]

Article 17 Entry into force  

This decision shall enter into force on 8 December 2000.  

Done at Munich, 7 December 2000.  

Ingo KOBER President  

-- CUT ---

For the gory technical details, see

http://db1.european-patent-office.org/dwl/epoline/epo-olf-standard.pdf






[FYI] Secret plan to spy on all British phone calls

2000-12-03 Thread Axel H Horns

http://www.observer.co.uk/uk_news/story/0,6903,406191,00.html

--- CUT ---

Secret plan to spy on all British phone calls

Kamal Ahmed, political editor Sunday December 3, 2000

Britain's intelligence services are seeking powers to seize all
records of telephone calls, emails and internet connections made by
every person living in this country.

A document circulated to Home Office officials and obtained by The
Observer reveals that MI5, MI6 and the police are demanding new
legislation to log every phone call made in this country and store
the information for seven years at a vast government-run 'data
warehouse', a super computer that will hold the information.

The secret moves, which will cost millions of pounds, were last night
condemned by politicians and campaigners as a sinister expansion of
'Big Brother' state powers and a fundamental attack on the public's
right to privacy.

Last night, the Home Office admitted that it was giving the plans
serious consideration.

Lord Cope, the Conservative peer and a leading expert on privacy
issues, said: 'We are sympathetic to the need for greater powers to
fight modern types of crime. But vast banks of information on every
member of the public can quickly slip into the world of Big Brother.
I will be asking serious questions about this.' Maurice Frankel, a
leading campaigner on per sonal data issues, called the powers
'sweeping' and a cause for worry.

The document, which is classified 'restricted', says new laws are
needed to allow the intelligence services, Customs and Excise and the
police access to telephone and computer records of every member of
the public.

It suggests that the Home Office is sympathetic to the new powers,
which would be used to tackle the growing problems of cybercrime, the
use of computers by paedophiles to run child pornography rings, as
well as terrorism and international drug trafficking.

Every telephone call made and received by a member of the public, all
emails sent and received and every web page looked at would be
recorded.

Calls made on mobile phones can already be pinpointed geographically,
as can those made from land lines. The police would be able to use
'trawling' computer techniques to look through millions of telephone
and email records. Campaigners say innocent people could have such
highly personal information accessed.

The document admits the moves are controversial and could clash with
the Human Rights Act, which gives people a right to privacy, European
Union law and the Data Protection Act, which protects the public
against official intrusion into private lives.

The office of the Data Protection Commissioner, Elizabeth France, has
already expressed 'grave concerns' .

'A clear legislative framework needs to be agreed as a matter of
urgency,' says the document, which is dated 10 August and is thought
to have been sent to Home Office Minister Charles Clarke.

'Why should data be retained? In the interests of justice, to
preserve and protect data for use as evidence to establish proof of
innocence or guilt. For intelligence and evidence gathering purposes,
to maintain the effectiveness of UK law enforcement, intelligence and
security agencies to protect society.'

The document is written by Roger Gaspar, the deputy director-general
of the National Criminal Intelligence Service, the Government agency
that oversees criminal intelligence in the United Kingdom. Gaspar, as
head of intelligence for NCIS, is one of the most powerful and
influential men in the field.

The report says it is written 'on behalf of Acpo [the Association of
Chief Police Officers], HM Customs and Excise, security service,
secret intelligence service and GCHQ [the Government's secret
listening centre based at Cheltenham]'.

Gaspar argues telephone companies should be ordered to retain all
records of phone calls and internet access.

At the moment many telephone and internet service providers keep data
for as little as 24 hours.

'In the interests of verifying the accuracy of data specifically
provided for either intelligence or evidential purposes, CSPs
[communication service providers such as telephone or internet
companies] should be under an obligation to retain the original data
supplied for a period of seven years or for as long as the
prosecuting authority directs,' the document says.

'Informal discussions have taken place with the office of the data
protection commissioner. Whilst they acknowledge that such
communications data may be of value to the work of the agencies and
the interests of justice they have grave reservations about longer
term data retention.' The document says the new data warehouse would
be run along similar lines to the National DNA Database for profiles
of known criminals.

It would cost about £3 million to set up and £9m a year to run.

The report demands that the Government 'should be prepared to defend
our position'.

A spokesman for NCIS refused to be 

Re: Is PGP broken?

2000-11-29 Thread PA Axel H Horns

On 29 Nov 2000, at 7:07, Stephan Eisvogel wrote:

 Adam Back wrote:
  (And also without IDEA support for patent reasons even now
  that the RSA patent has expired.)
 
 Do you know when the IDEA patent will expire? I will hold a
 small party myself then. B)

The EP 0 482 154 of ASCOM TECH AG has been filed on May 16, 1991.
Add 20 Years. If ASCOM TECH AG pays annual renewal fees to the 
respective national Patent Offices every year. Otherwise it might 
lapse earlier.

Axel H Horns




[FYI] Microsoft Signed code: Security or censorship?

2000-11-28 Thread PA Axel H Horns

http://uk.news.yahoo.com/001127/15/aqa88.html

--- CUT -

Monday November 27, 5:01 PM

Signed code: Security or censorship?  

Depending on Microsoft's approach, code signing could not only secure 
the desktop, but the software giant's control over it as well  

A push by Microsoft to secure each program that runs on its next-
generation PC operating system could easily be used to tighten its 
control over software developers, warned security experts last week.  

Several reports claimed that Microsoft plans to secure the code of 
its next-generation consumer operating system, codenamed Whistler, 
with digital signatures in an effort to prevent viruses and Trojan 
horses.  

Known as code signing, the technique links a software developer's 
name with a program or Internet applet using digital signatures. The 
code cannot be changed without destroying the signature, giving users 
a way to link a company with a program. If something goes wrong, the 
user will know whom to blame.  

Yet the technique could also give Microsoft a way to regulate the 
code that's allowed to run on the consumer desktop, said Bruce 
Schneier, chief technology officer of security service provider 
Counterpane Internet Security.  

"It certainly consolidates power," he said.  

While Schneier believes code signing, if done right -- "a big if", he 
said -- could better secure the desktop, the control over the 
issuance of digital signatures for software developers should be a 
concern.  

[...]

--- CUT -





[FYI] SDMI cracked.

2000-10-15 Thread Axel H Horns

http://www.salon.com/tech/log/2000/10/12/sdmi_hacked/index.html

- CUT 

SDMI cracked! 

Hackers break the recording industry's vaunted music protection 
system.  

By Janelle Brown  

Oct. 12, 2000 | Watch out -- recording industry executives are about 
to start running for cover. All of the Secure Digital Music 
Initiative's watermarks -- its much ballyhooed music protection 
scheme -- have been broken. A spokesperson for SDMI has denied the 
reports, but according to three off-the-record sources, the results 
of the Hack SDMI contest are in and not one single watermark resisted 
attack.  

[...]

Is there an alternate solution, though? Many SDMI members think there 
isn't one -- and that this could mean that SDMI will now implode for 
lack of any plausible ideas for how to meet the recording industry's 
demands for secure music.  

[...]

- CUT 







Re: software patents in Europe

2000-09-13 Thread PA Axel H Horns

colorparam0100,0100,0100/paramOn 13 Sep 2000, at 8:55, Steve Bellovin wrote:


colorparam7F00,,/param A final decision will be made in November.


/colorOn November 20, 2000 up to November 29, a Diplomatic Conference of 
the Mamber States of the European Patent Convention will be held in 
Munich:


  http://www.epo.co.at/epo/dipl_conf/index.htm


The "Basic Proposal" is available via:


  http://www.epo.co.at/epo/dipl_conf/proposal.htm


The key point with regard to software  business methods patents is 
the Revision of Art. 54 of the European Patent Convention which 
currently reads:


http://www.european-patent-office.org/legal/epc/e/ar52.html


Article 52 - Patentable inventions



(1)* European patents shall be granted for any inventions which are 
susceptible of industrial application, which are new and which 
involve an inventive step.   


(2) The following in particular shall not be regarded as inventions 
within the meaning of paragraph 1:   


(a) discoveries, scientific theories and mathematical methods;   


(b) aesthetic creations;   


(c) schemes, rules and methods for performing mental acts, playing 
games or doing business, and programs for computers;   


(d) presentations of information.   


(3) The provisions of paragraph 2 shall exclude patentability of the 
subject-matter or activities referred to in that provision only to 
the extent to which a European patent application or European patent 
relates to such subject-matter or activities as such.   


(4)* Methods for treatment of the human or animal body by surgery or 
therapy and diagnostic methods practised on the human or animal body 
shall not be regarded as inventions which are susceptible of 
industrial application within the meaning of paragraph 1. This 
provision shall not apply to products, in particular substances or 
compositions, for use in any of these methods.   


The Basic Proposal discusses:  


Article 52 Patentable inventions Patentable inventions   


(1) European patents shall be granted (1) European patents shall be 
granted for any inventions which are susceptible of industrial 
application, which are new and which involve an inventive step for 
any inventions in all fields of technology, provided that they are 
new, involve an inventive step and are susceptible of industrial 
application.   


So, the Draft would mean that in particular Art. 52 Para. (2) lit. c) 
EPC together with Art. 52 Para. 3 EPC prohibiting patenting of 
programs for computers "as such" is to be replaced by a feature 
according to which the invention must belong to any "field of 
technology".


However, there is no real difference. If a programm running on a 
particular computer causes some kind of physical side effect it was 
considered by case law not to be a program "as such" and, moreover, 
of technical nature.


In fact, a considerable number of crypto algorithms is covered by 
patents granted by the European Patent Office; e.g. IDEA under Patent 
Number EP 0,482,154 B1.


The only message seems to be that the EPC shall not be amended for 
allowing pure "business method patents" not involving any IT 
infrastructure.


Axel H Horns

Patentanwaltcolorparam0100,0100,0100/param





[FYI] European Parliament will vote in july on inquiry committee on Echelon

2000-06-19 Thread Axel H Horns

http://www.heise.de/tp/english/special/ech/6852/1.html

 CUT -

European Parliament will vote in july on inquiry committee on Echelon 

Jelle van Buuren   15.06.2000  

Internal wrangling about procedural mistakes and rumours about 
British attempts to block inquiry.  

After a week of internal wrangling in the European Parliament, 
parliament's president Nicole Fontaine assured that the decision on 
an inquiry committee on the Echelon spying system will be taken by 
the plenary session of the European Parliament. The decision will 
however not be taken this week, as the Greens demanded, but in july.  

The Greens accused last week the big political parties of the 
European Parliament of obstructing the inquiry. The major political 
parties first rejected the wish to install an inquiry committee and 
favoured a weaker temporary committee. Then, they asked the 
parliaments legal service opinion on the mandate for such a 
committee. The legal service declared last week a temporary committee 
cannot lead an inquiry. The Conference of Presidents (which unites 
the leaders of the political groups in Parliament) was unable to 
decide last week on how to proceed the investigation.  

The Greens accused the major political parties of obstruction and 
asked for a plenary vote this week on the issue. The leader of the 
Socialist Group, Enrique Baron Crespo, sought to dismiss the Greens 
proposal on procedural grounds, arguing that at this late stage it 
could not be added to the parliaments agenda. The rumour is British 
officials were pressuring Nicole Fountaine and the big political 
parties to block any probe into the operation of Echelon. But now 
Fontaine has made it clear the parliaments plenary will vote on the 
issue in july. The Greens will repeat their demand for a fully-
fledged inquiry committee on Echelon. Paul Lannoye, president of the 
Green Group said:  

'The decision of the Parliament's Presidency sets an important 
precedence. By having a vote in plenary, the wishes of 180 
signatories of all political groups to have an inquiry committee is 
treated with democratic respect.'  

 CUT -





[FYI] European Justice and Home Affairs Council considers preventive measures against Echelon

2000-05-30 Thread Axel H Horns

http://www.heise.de/tp/english/inhalt/te/6816/1.html

--- CUT 

European Justice and Home Affairs Council considers preventive 
measures against Echelon  

Jelle van Buuren   30.05.2000  

Technical working group asked to look into measures to prevent abuse 
of interception of telecommunications  

The European Council on Justice and Home Affairs discussed yesterday 
during lunch Echelon, the Anglo-American spying network that 
according to reports of the European Parliament is being used to 
intercept sensitive economical and political communication.  

Although the European ministers of Justice said hard proof is failing 
for the accusations, they are worried about the possible misuse of 
electronic spionage. ' While telecommunication interception may be an 
important tool in combatting crime or for the defence of national 
security, in no case may it be used to gain commercial advantage,' 
according to the Council.  

The ministers decided to install a technical working group, which has 
to investigate if 'technical measures', like strong encryption, are 
possible to prevent the misuse of intercepted material. The Council 
hailed the initiative of the European Commission to bring forward 
appropriate measures for 'achieving a more secure information 
society'. Further, it instructed Council working parties to encourage 
'preventive measures which may protect against the abuse of new 
technologies.'  

Dutch minister of Justice Benk Korthals said to the Dutch press there 
was no real proof of spying, but it was better to take preventive 
measures. He asked for further studies on the possibility to make 
international rules regarding the interception of telecommunications. 
Also, he warned for the possibility organised crime would get the 
technical possibilities to intercept satellite communications.  

--- CUT 




[FYI] (Fwd) EU Echelon investigation knobbled? [OT]

2000-05-23 Thread Axel H Horns


--- Forwarded message follows ---
From:   Martin Cooper [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject:EU Echelon investigation knobbled? [OT]
Date sent:  Tue, 23 May 2000 14:37:48 +0100
Send reply to:  [EMAIL PROTECTED]

According to the latest issue of Private Eye, the EU
investigation into Echelon is being "quietly" dropped
as a result of lobbying by the European Labour group.

AIUI there is some connection with the Eurofighter
procurement, but I couldn't make out quite what it
was.

M.


--- End of forwarded message ---




[FYI] ECHELON for combat of european national culture of bribery?

2000-03-12 Thread Axel H Horns

http://www.heise.de/tp/deutsch/special/ech/6662/1.html

-- CUT -

Former CIA Director Says US Economic Spying Targets "European 
Bribery"  

Duncan Campbell   12.03.2000  

"We have spied on that in the past. I hope ... that the United States 
government continues to spy on bribery."  

Former United States Central Intelligence Agency director James 
Woolsey confirmed in Washington this week that the US steals economic 
secrets "with espionage, with communications [intelligence], with 
reconnaissance satellites", and that there was now "some increased 
emphasis" on economic intelligence.  

He claimed that economic spying was justified because European 
companies had a "national culture" of bribery and were the "principle 
offenders from the point of view of paying bribes in major 
international contracts in the world".  

[...]

-- CUT -




WIPO in support of Key Recovery?

2000-02-15 Thread Axel H Horns

Currently the World Intellectual Property Organization WIPO (an UN 
subsidiary) makes efforts to implement facilities for electronic 
filing of patent applications according the "Patent Cooperation 
Treaty" (PCT) to be operative in 2001:

  http://www.wipo.int/eng/document/govbody/wo_pct/index_28.htm

De facto this means that on the long run all national Patent and 
Trade Mark Offices will have to comply with this technical system.

I think this is relevant well beyond the Intellectual Property 
theatre; this project seems to be de facto also a pilot for further e-
government developments, particularly in the field of electronic 
court filing.

So, it might be of some general interest to know that the GAK, key 
escrow, and key recovery discussion is not finished. This is the 
latest draft for a *technical* standard of electronic filing to be 
adopted by the WIPO PCT bodies:

http://www.wipo.int/eng/document/govbody/wo_pct/pdf/pct28_3a1.pdf

--- CUT --
--

[...]

SCIT/P 8/99 Rev.1 
Annex 5, page 19 

3.4.8 Key Recovery 

A subscriber should be able to recover data, which they have 
encrypted or that was encrypted for them, even though their 
decryption private key becomes unavailable. The key may become 
unavailable for a variety of reasons including, inability to access 
the stored key (e.g., forgets password), corruption of the stored 
key, failure of the storage medium, and theft of the key or storage 
medium. An organization should be able to recover its data, which has 
been encrypted by subscribers, when the subscriber is unable or 
unwilling (e.g., disgruntled, incapacitated, unavailable) to decrypt 
the data.  

The IP Office PKI may provide the capability for key recovery of 
internal and external subscriber decryption keys. In order to meet 
these requirements, a copy of each user's private decryption keys 
must be obtained and securely stored to enable the authorized 
recovery of encrypted data.  

Key recovery does not apply to the subscriber's signing keys. The 
subscriber's private signing keys are not recoverable due to the 
requirement for effective non­repudiation. Non­repudiation is 
supported by having the subscriber generate his signing key pair on 
his own system and only transferring his public verification key to 
the Certification Authority during the registration process. The 
private signing key must remain under the sole control of the 
subscriber so that there is no opportunity to mascarade.  

The following discussion applies to decryption key recovery only. It 
is a highly sensitive PKI function since it deals with the 
confidentiality of communications and files which may, as with patent 
application prosecution, be held in confidence by law.  

Key recovery for external subscribers may only be initiated by the 
subscriber, a Registration Authority, or a Local Registration 
Authority by following established key recovery procedures and 
interacting with the Registration Authority.  

For internal subscribers, a Registration Authority or Local 
Registration Authority should initiate key recovery only after 
authorization by appropriate IP office management. Such authorization 
may result from a request from the internal subscriber or from a 
requirement by management to access data encrypted by the subscriber. 
 

[...]

--- CUT --
--

Surprising especially in view of the fact that the Patent and Trade 
Mark Offices acting as "Receiving Offices" in the PCT system are 
authorities which usually co-operate with the security branches of 
the government since the invention of the patent system ...

At least they should have made a conceptual distinction between 
private keys for secure transmission and private keys for secure 
archive storage. I think this would make an important difference.

Axel H Horns



NEC Claims World's Strongest Encryption System - still more snake oil?

2000-01-24 Thread Axel H Horns

http://www.idg.net/idgns/2000/01/24/NECClaimsWorldsStrongestEncryption
System.shtml

--- CUT -

NEC Claims World's Strongest Encryption System  

by Martyn Williams, IDG News Service\Tokyo Bureau January 24, 2000  

TOKYO (01/24/2000) - NEC Corp. today announced it has developed a new 
encryption technology, CipherUnicorn-A, which it claims to be the 
strongest in the world.  

The technology is based upon common key encryption - in which a 
single key is used for both the encoding and the decoding functions - 
but has a twist, explained Hiroshi Miyauchi, research manager at 
NEC's CC Media Laboratories. As in other common key systems, a 
randomly generated master key, 128 bits in size, is first created. 
However, unlike in other systems, this is not used to encrypt or 
decrypt the file.  

NEC's system creates a intermediate key of several thousand bits in 
length from the master key, and that serves as the base for the 
encryption process.  [...]

[...]

--- CUT -




[FYI] EU Directive 1999/93/EC on electronic signatures finally published

2000-01-20 Thread Axel H Horns

DIRECTIVE 1999/93/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 13 
December 1999 on a Community framework for electronic signatures  

Official Journal of the European Communities L13 (2000) of 2000-01-19, pp. 12ff.

http://europa.eu.int/eur-lex/en/dat/2000/l_013/l_0132119en00120020.pdf





[FYI] DN: SPEECH/99/122 by Mr Erkki LIIKANEN on Crypto

1999-10-05 Thread Axel H. Horns


http://europa.eu.int/rapid/start/cgi/guesten.ksh?p_action.gettxt=gtdo
c=SPEECH/99/122|0|RAPIDlg=EN

 CUT ---

Speech by Mr Erkki LIIKANEN Member of the European Commission for 
Enterprise and Information Society Trust and Security in Electronic 
Communications : The European Approach Information Security Solutions 
Europe (ISSE 99)Welcome Address Berlin, 4 October 1999  


 DN: SPEECH/99/122 Date: 1999-10-05


 TXT: EN
 PDF: EN
 Word Processed: EN

SPEECH/99/122 

Speech by Mr Erkki LIIKANEN 

Member of the European Commission for Enterprise and Information 
Society 

Trust and Security in Electronic Communications : The European 
Approach 

Information Security Solutions Europe (ISSE 99) Welcome Address 

Berlin, 4 October 1999

1. INTRODUCTION 

Ladies and gentlemen, 

To start with, I would like to congratulate The European Forum for 
Electronic Business and Teletrust for organising this conference. A 
comprehensive European event on security held on a yearly basis was 
much needed in Europe. I therefore wish that ISSE will become a major 
event in Europe when it comes to discussing information security 
issues, not only amongst the converted, but also, and hopefully 
increasingly, the laymen.  

The very launch of this event, and the broad audience it attracted on 
its first edition, already demonstrates a few things: 

First, that there is a growing interest for information security 
issues in Europe. This is a direct result of the rapid growth of the 
Internet and electronic commerce in Europe. The latter is good news 
for Europe considering the growing importance of the networked 
economy in terms of growth and employment.  

Second, that European Union policies have been successful. I don't 
mean to take all the credit for the take-up of the Internet and 
electronic commerce in Europe especially since our conviction is that 
the development of the information society must, and can only be 
market-led. Yet it is clear that the liberalisation of 
telecommunications in the Union has created the right conditions for 
the expansion of the Internet and electronic commerce.  

2. WHY IS CRYPTOGRAPHY SO IMPORTANT? 

Cryptographic technologies are at the heart of information security. 
A few years ago, cryptography was still an arcane topic restricted to 
a closed circle of people in the known. It is only recently, with the 
growth of the Internet, that cryptography and on-line security has 
made it to the headlines.  

Why? Simply because cryptography is the preferred, if not only, means 
to ensure authenticity and confidentiality in electronic 
communications. Without it, there will be no safe electronic 
communications.  

The bottom line is: no security, no trust, no notable shift towards 
commercial and financial transactions on the Internet! And all the 
impressive forecasts we have seen regarding the growth of electronic 
commerce will remain pie in the sky.  

With close to 200 million Internet users, there is already, today, a 
strong market basis for security products and services. This is 
clearly indicated by the multiplication and the impressive growth 
figures of cryptographic companies. For the time being, the security 
market largely remains a corporate one. This is no surprise since 
business-to-business activities carried out over proprietary networks 
still account for over 85% of the total electronic commerce market.  

But the security market will only really explode once it becomes a 
mass market. 

The odds are, that the Internet will be everywhere in Europe in a 
matter of five years or so. We can expect half of the European 
population to be hooked on the Internet by 2005. Not only that there 
will be a computer connected to the Internet in half of Europe's 
homes. But access terminals become increasingly diversified and 
include, not only the computer, but increasingly the digital TV set-
top box, the personal assistant or the mobile phone, and very soon 
cars and even home appliances.  

But then again, who will routinely shop on-line if the credit card 
number cannot be transmitted safely? If there is no guarantee that 
the orders placed will be not fed into a marketing database to create 
a highly detailed buyer's profile?  

The same applies to simply surfing the Net. For how much longer will 
Internauts accept to leave footprints on every Web site they visit, 
allowing outsiders to track down their every move and interest? How 
many people will be discouraged from getting on-line by the fear of 
loosing their privacy?  

This means that all along the chain of Internet services, there is an 
essential need for security features.  

Since the technology is there, this doesn't seem to be a problem, 
only a breath-taking business opportunity for the cryptographic 
industry. But actually no! The situation can be compared to 
telecommunications services in Europe: Their growth is directly 
linked to the 

CROCKER and population count opcodes on CDC mainframes

1999-05-18 Thread Axel H. Horns

This is a brief excerpt from the CV of Mr. J. Kenneth Moore, Sr.
Some months ago there was a discusion on this list regarding the 
"population count" opcodes of several CDC mainframes in the 70ies. It 
was uncovered that this opcode was for plaintext detection.

Now I am wondering whether a project named "CROCKER" and mentioned in 
Mr. Moore's CV was related to the implementation of population count 
opcodes by CDC. Said particular opcodes appeared to be quite useless 
outside code-breaking business.

Regards

Axel H Horns

--**

http://jya.com/nsa-crocker.htm
http://www.ariva.com/jkm1/jkm-res.htm

--- CUT -

[...]

Conducted an in-depth analysis of the flow of data though the NSA
computer complex from the point of intercept to the production of
reports. This was the world's largest computer installation with over
twenty high-speed mainframes from a variety of vendors. Interviewed
product users, schedulers, systems analysts and computer operations
staff. Analyzed computer utilization data and co-authored a technical
report with findings and recommended specific areas for improvement.
Hardware: IBM S/360, Univac 1100, Burroughs B6600, CDC Cyber, CDC
1604, GE 635, IBM 7074, IBM 1401, Digital PDP-10.

Responsible for integrating and testing a memory control unit for the
CROCKER Processing System. The CROCKER system was designed to improve
the processing throughput of decryption software by loading large
amounts of encrypted intercept into parallel banks of shared
high-speed mass memory and processing the data with multiple special
purpose parallel processors. The system was integrated with an IBM
360/65 mainframe, three special function processors and eight memory
banks of high-speed core memory. A fast switching unit implemented
with TTL LSI chips on wire wrap boards controlled access to the
memory. Integrated boards in rack-mounted back plane.

[...]

--- CUT -



Trilateral PKI Standard

1999-01-16 Thread Axel H Horns

Under

  http://www.ipjur.com/pki.pdf

I have posted a document 

"Trilateral Technical Standard for the On-line Exchange of IP 
Documents in a PKI Environment" dated November 05, 1999.

It conveys a commpon position of the European Patent Office, the US 
Patent Office, and the Japanese Patent Office on a crypto standard 
for electronic filing of patent applications and the like.

In general it seems to be not so bad (relying on well-known 
standards) but there are somewhat unclear text portions on key 
recovery.

Axel H Horns