On Fri, 5 Feb 1999, bram wrote:
> I have a theory that no matter what computing machine is available, as
> long as the same machine is available to both the encrypter and the
> cracker, the cracker wins (barring non-turing complete machinery, of
> course.)
Jim Gillogly pointed out that I misspok
On Fri, 5 Feb 1999, John Kelsey wrote:
> Anyway, there's a fair amount of crypto that would keep
> working even if all public-key methods became breakable.
> Not only symmetric cryptography, but variations on Merkle's
> puzzles (Bob Jenkins was discussing a bunch of mechanisms
> for this a couple
>Because the watermark is going to be different for every copy of a
>particular song this suggests that if you get three copies of a song with
>different watermarks and do bit voting with them you can produce a fourth
>file that contains all the information that is the same in the first three
>(th
"Arnold G. Reinhold" <[EMAIL PROTECTED]> wrote (some time ago)
> Subject: Re: Self Incrimination and Cryptographic Keys in US
> This discussion deserves an FAQ of its own
I haven't participated in the discussion on [EMAIL PROTECTED], but
there is a similar thread on ukcrypto in which I me
> Michael Motyka[SMTP:[EMAIL PROTECTED]]
>
> Pretty damn generic patent.
I'm thinking of taking out a US patent on a method of personal;
transportation that involves putting one foot in front of the other on the
ground or any other approximatly horizontal surface, shifting the balance of
the bod
At 01:04 AM 2/5/99 -0600, John Kelsey wrote:
>>At 10:45 AM 2/1/99 -0700, [EMAIL PROTECTED] wrote:
>>>Suppose someone discovers a way to solve NP-complete
>>>problems with a quantum computer; should he publish?
>>>Granted, the quantum computers aren't big enough yet, but
>>>the prospects look brigh
Danger: spooks at work
by STEWART FIST
The Australian
2feb99
ONE standby of investigative journalism is the Freedom of
Information Act (the FOI) which sometimes allows reporters to
access documents that politicians or bureaucrats would prefer
remain hidden.
Hi,
I recommend Strong Password authentication SPEKE
http://world.std.com/~dpj/speke97.html , Secure RPC Autthentication
(SRA)mechanism ftp://net.tamu.edu/pub/security/TAMU, IBM's KryptoKnight
http://www.zurich.ibm.com/Technology/Security/extern/kryptoknight/
With regards,
==
-BEGIN PGP SIGNED MESSAGE-
[ To: Perry's Crypto List ## Date: 02/04/99 ##
Subject: Re: quantum cryptanalysis ]
Date: Wed, 03 Feb 1999 01:04:20 -0800
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
From: Bill Stewart <[EMAIL PROTECTED]>
Subject: Re: quantum cryptanalysis
Cc: [EMAIL PROTECTED]
Louis Freeh, Federal Bureau of Investigation director called Canada a
"hacker haven," where cyber terrorism can operate.
I don't see why Canada is considered a haven. We have laws about
computer crimes, allow strong domestic encryption, the federal
government has even has started an internal PKI
10 matches
Mail list logo