Re: bo2k cryptography

1999-08-23 Thread mischief
The authors have announced and fixed one bug where the keys generated were always the same. Full scrutiny would be advisable before deployment. Bluefish wrote: > > I've received some questions by email which are beyond my ability to > answer. The questions are about the cryptographic strength of

ecc question

1999-08-23 Thread staym
The ecc discrete log problem is given points A and B, find integer x such that xA=B if it exists. I assume that most crypto implementations of ecc use finite fields; in a finite field can you assume that x exists? -- Mike Stay Cryptographer / Programmer AccessData Corp. mailto:[EMAIL PROTECTED]

EE578/CS578, Cryptography and Data Security

1999-08-23 Thread Robert Hettinga
--- begin forwarded text Date: Mon, 23 Aug 1999 13:47:19 -0400 (EDT) From: Christof Paar <[EMAIL PROTECTED]> To: WPI Crypto Seminar: ; Subject: EE578/CS578, Cryptography and Data Security Sender: [EMAIL PROTECTED] Reply-To: Christof Paar <[EMAIL PROTECTED]> Below is a description of EE578/CS57

Re: going around the crypto

1999-08-23 Thread Tom Weinstein
Marcus Leech wrote: > > "Steven M. Bellovin" wrote: > > > > It's clearly not automatic, but I suspect it would work > > > User behaviour is the weak point here--while the browsers WILL notify > you that the cert is signed by a CA you don't recognize, they also > give you the option of acc

Re: s/w radios & secure modules

1999-08-23 Thread Arnold Reinhold
At 11:06 PM -0700 8/21/99, Martin Minow wrote: >At 2:39 PM -0700 8/21/99, David Honig wrote: >>In the Aug 16 '99 EETimes, there are several articles >>about software radios. These have analog front ends, >>and after down-conversion are digital. This lets you >>deal with complex back-compatabilit

Re: linux-ipsec: Re: Summary re: /dev/random

1999-08-23 Thread Jim Thompson
> From: "Arnold G. Reinhold" <[EMAIL PROTECTED]> > [...] > I spent some time searching the Web for hardware randomness sources > and I have summarized what I found at > http://www.world.std.com/~reinhold/truenoise.html. I located several > serial port RNG devices and some good sources of white

Re: CPU-Controlled Compromising Emanations

1999-08-23 Thread Barney Wolff
I recall seeing programs that would play music (not hi-fi :) on a nearby radio receiver, in 1962. Isn't this what Tempest stuff is all about? Barney Wolff <[EMAIL PROTECTED]>

CPU-Controlled Compromising Emanations

1999-08-23 Thread Berke Durak
Hello, I've compiled a web page with detailed descriptions of my previous findings, of another transmission method and of experiments showing the feasibility of data transmission and recovery using these methods. The address is: http://altern.org/berke/tempest/ -- Berke Durak [EMAIL P