RE: NSA key in MSFT Crypto API

1999-09-13 Thread Peter Gutmann
This topic has problably just about reached its use-by date, but I recently saw a comment by "J. Andrs Hall" <[EMAIL PROTECTED]> on how to cripple Microsoft's own CSP's using _NSAKEY: >Because the person posessing the private key corresponding to _NSAKEY can now >take a trusted, signed CSP (even

Re: Power analysis of AES candidates

1999-09-13 Thread Eugene Leitl
Why don't you just erase flash when a pressure change (hull breach) is detected. Using double-walled hull, to look for shortcuts. You can also couple this to light detection, and whatnot. Andreas Bogk writes: > Russell Nelson <[EMAIL PROTECTED]> writes: > > > > There's some question about

Re: Paul Brown on Solitiare randomness flaw?

1999-09-13 Thread amanda
There is Secret! with strong encryption for Palm. As you saw on Isaac, Ian Goldberg has ported SSLeay to Palm and implemented SSH. Ascii armour is very useful if you use e-mail for the transmission. There are lots of e-mail software for the Palm. A good and free e-mail program is also on the

MSFT's NSA key as key escrow solution

1999-09-13 Thread Adam Back
Several people (Carl Ellison?, others) have suggested over the years of the key escrow debate that if the government wants a voluntary key escrow system all they have to do is publish a public key, and anyone wanting to use it can Cc them. A good source of a public key we know is the NSA's publi

How many ways can one form an abelian group with N symbols?

1999-09-13 Thread staym
How many ways can one form an abelian group with N symbols? Note that I'm not asking how many groups there are of order N, since isomorphisms count separately, and it's not just the number of abelian groups times the number of permutations of the symbols, since the identity element isn't preserve