Hi David,
Very briefly because I'm swamped today: Please consider bringing some
of this to Metricon
(https://securitymetrics.org/content/Wiki.jsp?page=Welcome)
Also there's a project of US DHS/NIST and probably others called
SAMATE Software Assurance Metrics and Tool Evaluation
Really? How does one go about proving the security of a block cipher?
My understanding is that you, and others, perform attacks against it,
and see how it holds up. Many of the very best minds out there
attacked AES, so for your new CS2 cipher to be provably just as
secure as AES-128, all those
- Forwarded message from Jennifer S. Granick [EMAIL PROTECTED] -
X-Sender: [EMAIL PROTECTED]
Date: Wed, 17 Apr 2002 10:05:27 -0800
To: [EMAIL PROTECTED]
From: Jennifer S. Granick [EMAIL PROTECTED]
Subject: STANFORD CONFERENCE ON VULNERABILITY DISCLOSURE: Early Reg to
Close Soon!
The
Does this work if I put up a fake key on my website? If I put a fake
key into the keyservers? How is that different from importing a
signed, exported key from disk?
Adam
On Mon, Jan 08, 2001 at 03:58:58PM +0100, Michael Kjorling wrote:
| -BEGIN PGP SIGNED MESSAGE-
| Hash: SHA1
|
|
On Tue, Oct 12, 1999 at 11:17:29AM -0700, David LeBlanc wrote:
| I was in the middle of the effort to try and protect ISS' Scanner against
| the licensing being cracked, so I've got some unique insight. It took the
| crackers about 3 months to crack the 4.0 release of the NT scanner (I was
|