Posting Kerberos on the World-Wide Web
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Pursuant to 15 CFR Part 734, notice is hereby given that the following files
containing open Kerberos source code will be published at
http://cryptography.org/source/kerbnet/ (with links from
I've got something with around 100 bytes of ram and an 8-bit multiply.
Is there an authentication mechanism that can fit in this?
--
Mike Stay
Programmer / Crypto guy
AccessData Corp.
mailto:[EMAIL PROTECTED]
Declan McCullagh wrote:
Date: Tue, 18 Jan 2000 10:01:49 -0500
From: "JIM LEWIS" [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Cc: "EUGENE COTTILLI" [EMAIL PROTECTED]
Subject: Re: FC: Is this man a crypto-criminal? The Feds won't say...
Declan: This point is
[EMAIL PROTECTED] wrote:
I've got something with around 100 bytes of ram and an 8-bit multiply.
Is there an authentication mechanism that can fit in this?
HMAC?
Cheers,
Ben.
--
SECURE HOSTING AT THE BUNKER! http://www.thebunker.net/hosting.htm
http://www.apache-ssl.org/ben.html
"My
At 04:49 PM 01/18/2000 -0700, [EMAIL PROTECTED] wrote:
I've got something with around 100 bytes of ram and an 8-bit multiply.
Is there an authentication mechanism that can fit in this?
What types of attacks are you concerned with? That's the main question. If
you have a direct, unsniffable
On Tue, Jan 18, 2000 at 08:20:24PM -0800, Ryan Lackey wrote:
The main competition for gale is:
* IRC
IRC is used by perhaps 100 000 users worldwide. IRC affords
no message encryption, minimal authentication (identd is
sometimes used, which is almost worse than nothing at
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Notice is hereby given that the following files containing open Pretty Good
Privacy source code and documentation will be published at
http://cryptography.org/source/pgp with links from
http://cryptography.org/source:
At 11:13 AM -0600 1/19/2000, Rick Smith wrote:
At 04:49 PM 01/18/2000 -0700, [EMAIL PROTECTED] wrote:
I've got something with around 100 bytes of ram and an 8-bit multiply.
Is there an authentication mechanism that can fit in this?
What types of attacks are you concerned with? That's the main