[cryptography] Bulgarian Cryptography Days 2012 (BulCrypt 2012)

2012-06-02 Thread Nikolai Stoianov
Dear colleagues,

On behalf of the organizers of the Bulgarian Cryptography Days 2012 - BulCrypt 
2012 (September 20 - 21, 2012, Sofia, Bulgaria) I invite you to present 
innovations, research 
projects and applications in the field of cryptography.


Bulgarian Cryptography Days 2012 (BulCrypt 2012) 
20-21 September 2012, Sofia, Bulgaria 

Call for Papers 
--- 
Bulgarian Cryptography Days 2012 (BulCrypt 2012) 
http://bulcrypt2012.balkancrypt.org/ is an annual international 
conference covering research in all aspects of cryptology. The 1-st 
International Conference BulCrypt 2012 will be held in Sofia, Bulgaria. 
The conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of 
cryptography. Papers describing the application of cryptography 
technology, the implementation of systems, and lessons learned are also 
encouraged. 


Topics 
--- 
The conference topics include, but are not limited to: 
Theory of Cryptography 
Applied Cryptography 
Internet and Cryptography 
Crypto Attacks 
Quantum Cryptography 


Important Dates 
--- 
Submission:  17 June 2012 
Notification of acceptance:     01 July 2012 
Camera ready:  22 July 2012 
Registration:  05 August 2012 


Paper Submission 
--- 
The papers of the BulCrypt 2012 will be published in conference 
proceedings. The maximum length of papers should be 4000 words including
tables and figures. Please adhere to the formatting standard for a 
10-12 page manuscript of Springer-Verlag LNCS 
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). The 
cover page must contain an abstract of about 120-180 words, 3-5 
keywords, name and affiliation of author(s) as well as the corresponding
author's e-mail and postal address. 
To register or submit a paper, please click here. The only 
acceptable review manuscript format is PDF. Please make sure your 
manuscript has all fonts embedded. 
Three categories of papers can be submitted: 
   Full Paper 
   Short Paper 
   Poster Paper 
Consistent with standard practice, each submitted paper will receive
rigorous peer reviewing. Papers will be selected based on their 
originality, timeliness, significance, relevance and clarity of 
presentation. The selection will be based on full papers. Submission 
implies the willingness of at least one of the authors to register and 
present the paper, if accepted. All papers accepted to the conference 
are expected to be presented. 
Accepted and presented full papers will be published in Journal of Cryptology 
and Information Security. 

Venue 
--- 
The conference will take place in Sofia, the largest city in 
Bulgaria, the capital of the Republic of Bulgaria and a popular tourist 
destination. The venue will be at the State University of Library 
Studies and Information Technologies, Bulgaria. 

Address 
--- 
Tsarigradsko shose 119 blvd., Sofia, Bulgaria


E-mail
--- 

bulcrypt2...@balkancrypt.org 
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] can the German government read PGP and ssh traffic?

2012-06-02 Thread Joe St Sauver
ianG asked:

#Would it be possible to describe in general words what LOA-1 thru 4 entails?

I hesitate to try to do so. The definitive answer can be found in 
http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf
and includes many subtle and important points, but just to focus solely
on the password/token requirement and vastly oversimplify things (ignoring
LOTS of other stuff that DOES really matter):

-- LOA-1: a password such that an attacker with no a priori knowledge of
the password will succeed in an in-band password guessing attack 1 in
1024 times (weak password auth)

-- LOA-2: as LOA-2, except 1 in 16,384 (stronger password auth)

-- LOA-3: requires multifactor auth (soft tokens are acceptable for this)

-- LOA-4: requires multifactor auth using a hard token (arguably, hard to
   do LOA-4 at scale with anything other than smart cards/PKI USB hard 
   tokens)

But truly, a couple of paragraphs cannot do justice to the 64 pages of 
NIST 800-63, and I'd urge you to refer to it directly if interested in
this topic.

Regards,

Joe
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography