Re: Dutch defense minister warns other countries have Echelon-type spy networks

2001-01-31 Thread Jaap-Henk Hoepman
king for specific information detailed to them, and reported these results to the ministry of Interior Affairs. Jaap-Henk -- Jaap-Henk Hoepman | Come sail your ships around me Dept. of Computer Science | And burn your bridges down University of Twente | Nick C

Re: What's Wrong With Content Protection

2001-01-23 Thread Jaap-Henk Hoepman
cturers will require a license on the decryption function, which they'll only get if they also implement copy protection. So devices without copy protection cannot legally decrypt the content, and therefore cannot play any of the popular content out there. These products will not sell on the market.

Re: 3G crypto algorithms

2001-01-23 Thread Jaap-Henk Hoepman
. Unfortunately I can't get to their > server at the moment for some reason, so I can't give you it's number, but > I think it is 33.2xx. > > thanks and regards, > Greg. > -- Jaap-Henk Hoepman | Come sail your ships around me Dept. of Computer Scie

Re: The Shining Cryptographers Net

2001-01-18 Thread Jaap-Henk Hoepman
wo photons simultaneously...). The idea to use quantum physics to get rid of the shared randomness is nice. I'm not sure that the approach outlined by Hal can be made to work. Jaap-Henk -- Jaap-Henk Hoepman | Come sail your ships around me Dept. of Computer Science | And burn y

Re: The Shining Cryptographers Net

2001-01-16 Thread Jaap-Henk Hoepman
y be able > to get lucky and acquire considerable information before he is detected. > > [... snip ...] -- Jaap-Henk Hoepman | Come sail your ships around me Dept. of Computer Science | And burn your bridges down University of Twente | Nick Cave - "Sh

Re: Fwd: from Edupage, December 22, 2000

2001-01-08 Thread Jaap-Henk Hoepman
to be the limit of what these systems can achieve. Using a different technique based on EPR pairs, this limit can be overcome using repeaters. I believe there is an application for these techniques. Perheps not to secure mass market e-commerce transactions. But if the hot line between Moskou and Wa

Re: Fwd: from Edupage, December 22, 2000

2001-01-03 Thread Jaap-Henk Hoepman
ing on the quantum key distribution channel is _always_ detected (by `laws of nature'), which is not true for these pressure-monitored cables. Jaap-Henk -- Jaap-Henk Hoepman | Come sail your ships around me Dept. of Computer Science | And burn your bridges down Univer

Re: copy protection

2000-12-26 Thread Jaap-Henk Hoepman
cense contract specifies requirements to manage the content according to its CMI [Content Management Information].' In other words, if all DVD content is encrypted, all DVD players will have to be compliant... We may see more compliant players than we like. Jaap-Henk

Re: UK Sunday Times: "Steal the face right off your head"

2000-12-14 Thread Jaap-Henk Hoepman
because the variation of the physical properties whose measurement these systems rely on is very large. Increasing the reliability would also increase the false rejection ratio, making the systems unusable. There's a paper on this in CARDIS '2000 of last September. Jaap-Henk -- Jaap-Hen

Re: Secrets & Lies, a comment

2000-09-06 Thread Jaap-Henk Hoepman
at http://www.hrl.il.ibm.com/proactive Actually, this sounds more like applying fault tolerance (e.g. byzantine agreement) techniques to increase security and dependability of your system. Also related are secret sharing techniques and methods to securely compute a function on a partially truste

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread Jaap-Henk Hoepman
ked quite usable and user friendly to me - as far as any secure email product could ever be completely be user friendly... The user has to do more stuff than usual, and has to have some understanding of what is going on in order to judge whether his/her security requirements have been met. Jaap-Henk

Re: New hash function definitions

2000-07-12 Thread Jaap-Henk Hoepman
ision for SHA1: M0 = h'(X)||00..0||L, and M1 = > h'(X*)||00..0||L. > > Comments? > > - --John Kelsey, [EMAIL PROTECTED] > > -BEGIN PGP SIGNATURE- > Version: PGPfreeware 6.5.1 Int. for non-commercial use > <http://www.pgpinternational.com> > Comment:

Re: Clinton signs bill to count wiretaps that encounter encryption

2000-05-06 Thread Jaap-Henk Hoepman
on the plaintext leaving the base station on the fixed network. Jaap-Henk -- Jaap-Henk Hoepman | Come sail your ships around me Dept. of Computer Science | And burn these bridges down University of Twente | Nick Cave - "Ship Song" Email: [EMAIL PROT

Re: [FYI] NL: Intelligence agency authorized to scan satellite communications

2000-04-12 Thread Jaap-Henk Hoepman
s of the Ministry of Internal Affairs, who would receive the relevant information. Jaap-Henk -- Jaap-Henk Hoepman | Come sail your ships around me Dept. of Computer Science | And burn these bridges down University of Twente | Nick Cave - "Ship Song" Ema

Re: Debit card fraud in Canada

1999-12-14 Thread Jaap-Henk Hoepman
roof" devices were. > These attacks on magstripe based cards have been around for ages... For even more clever attacks (without merchant cooperation) on outdoor ATMs see ftp://ftp.sri.com/risks/risks-20.31 Fake ATM front panel copies cards and PINs (Ulf Lindqvist) Jaap-Henk -- J

Re: Ten Risks of PKI

1999-12-14 Thread Jaap-Henk Hoepman
t; www.amazon.com, and direct it to your own site. Then you can offer your > bogus cert for www.amazon.com and get it accepted. Alternatively, the attacker could just register the domain anazon.com (if only amazon.con were possible :-) or amazon.be ("Look, Amazon's just started a Belgian b

Re: Digital Contracts: "Lie in X.509, Go to Jail"

1999-10-21 Thread Jaap-Henk Hoepman
gt; Do you know where to order this? None of the amazon.com sites has it, nor doe > s barnesandnoble.com. Ponsen and Looijen is _not_ a publisher, just a printer printing a lot of PhD theses. I'm afraid the only way to get a copy is as explained on http://www.xs4all.nl/~brands/order.tx

Re: Power analysis of AES candidates

1999-09-15 Thread Jaap-Henk Hoepman
he capacitor to supply power during 10 cycles must be 0.1 W * 10us (u = mu) Then 1/2 C V^2 = 25/2 C = 0.1 W * 10us In other words, the capacity of C equals 80nF. The trick now is to embed a capacitor of this size on the smart card chip itself such that it becomes even more difficult to monit