Re: quantum cryptanalysis

1999-02-05 Thread bram
On Fri, 5 Feb 1999, bram wrote: > I have a theory that no matter what computing machine is available, as > long as the same machine is available to both the encrypter and the > cracker, the cracker wins (barring non-turing complete machinery, of > course.) Jim Gillogly pointed out that I misspok

Re: quantum cryptanalysis

1999-02-05 Thread bram
On Fri, 5 Feb 1999, John Kelsey wrote: > Anyway, there's a fair amount of crypto that would keep > working even if all public-key methods became breakable. > Not only symmetric cryptography, but variations on Merkle's > puzzles (Bob Jenkins was discussing a bunch of mechanisms > for this a couple

Re: Liquid Audio & MP3

1999-02-05 Thread Bill Stewart
>Because the watermark is going to be different for every copy of a >particular song this suggests that if you get three copies of a song with >different watermarks and do bit voting with them you can produce a fourth >file that contains all the information that is the same in the first three >(th

Self Incrimination and Crypto FAQ

1999-02-05 Thread Bert-Jaap Koops
"Arnold G. Reinhold" <[EMAIL PROTECTED]> wrote (some time ago) > Subject: Re: Self Incrimination and Cryptographic Keys in US > This discussion deserves an FAQ of its own I haven't participated in the discussion on [EMAIL PROTECTED], but there is a similar thread on ukcrypto in which I me

RE: do you wish you did this??

1999-02-05 Thread Brown, R Ken
> Michael Motyka[SMTP:[EMAIL PROTECTED]] > > Pretty damn generic patent. I'm thinking of taking out a US patent on a method of personal; transportation that involves putting one foot in front of the other on the ground or any other approximatly horizontal surface, shifting the balance of the bod

Re: quantum cryptanalysis

1999-02-05 Thread Bruce Schneier
At 01:04 AM 2/5/99 -0600, John Kelsey wrote: >>At 10:45 AM 2/1/99 -0700, [EMAIL PROTECTED] wrote: >>>Suppose someone discovers a way to solve NP-complete >>>problems with a quantum computer; should he publish? >>>Granted, the quantum computers aren't big enough yet, but >>>the prospects look brigh

Danger: spooks at work

1999-02-05 Thread Julian Assange
Danger: spooks at work by STEWART FIST The Australian 2feb99 ONE standby of investigative journalism is the Freedom of Information Act (the FOI) which sometimes allows reporters to access documents that politicians or bureaucrats would prefer remain hidden.

RE: strong authentication without strong crypto?

1999-02-05 Thread Ivars Suba
Hi, I recommend Strong Password authentication SPEKE http://world.std.com/~dpj/speke97.html , Secure RPC Autthentication (SRA)mechanism ftp://net.tamu.edu/pub/security/TAMU, IBM's KryptoKnight http://www.zurich.ibm.com/Technology/Security/extern/kryptoknight/ With regards, ==

Re: quantum cryptanalysis

1999-02-05 Thread John Kelsey
-BEGIN PGP SIGNED MESSAGE- [ To: Perry's Crypto List ## Date: 02/04/99 ## Subject: Re: quantum cryptanalysis ] Date: Wed, 03 Feb 1999 01:04:20 -0800 To: [EMAIL PROTECTED], [EMAIL PROTECTED] From: Bill Stewart <[EMAIL PROTECTED]> Subject: Re: quantum cryptanalysis Cc: [EMAIL PROTECTED]

FBI call Canada 'hacker haven'

1999-02-05 Thread mctylr
Louis Freeh, Federal Bureau of Investigation director called Canada a "hacker haven," where cyber terrorism can operate. I don't see why Canada is considered a haven. We have laws about computer crimes, allow strong domestic encryption, the federal government has even has started an internal PKI