king for specific
information detailed to them, and reported these results to the ministry of
Interior Affairs.
Jaap-Henk
--
Jaap-Henk Hoepman | Come sail your ships around me
Dept. of Computer Science | And burn your bridges down
University of Twente | Nick C
cturers will
require a license on the decryption function, which they'll only get if they
also implement copy protection. So devices without copy protection cannot
legally decrypt the content, and therefore cannot play any of the popular
content out there. These products will not sell on the market.
. Unfortunately I can't get to their
> server at the moment for some reason, so I can't give you it's number, but
> I think it is 33.2xx.
>
> thanks and regards,
> Greg.
>
--
Jaap-Henk Hoepman | Come sail your ships around me
Dept. of Computer Scie
wo photons simultaneously...).
The idea to use quantum physics to get rid of the shared randomness is
nice. I'm not sure that the approach outlined by Hal can be made to work.
Jaap-Henk
--
Jaap-Henk Hoepman | Come sail your ships around me
Dept. of Computer Science | And burn y
y be able
> to get lucky and acquire considerable information before he is detected.
>
> [... snip ...]
--
Jaap-Henk Hoepman | Come sail your ships around me
Dept. of Computer Science | And burn your bridges down
University of Twente | Nick Cave - "Sh
to be the limit
of what these systems can achieve. Using a different technique based on EPR
pairs, this limit can be overcome using repeaters.
I believe there is an application for these techniques. Perheps not to secure
mass market e-commerce transactions. But if the hot line between Moskou and
Wa
ing on the quantum key distribution channel is _always_
detected (by `laws of nature'), which is not true for these pressure-monitored
cables.
Jaap-Henk
--
Jaap-Henk Hoepman | Come sail your ships around me
Dept. of Computer Science | And burn your bridges down
Univer
cense contract
specifies requirements to manage the content according to its CMI
[Content Management Information].'
In other words, if all DVD content is encrypted, all DVD players will have to
be compliant... We may see more compliant players than we like.
Jaap-Henk
because the variation of the physical
properties whose measurement these systems rely on is very large. Increasing
the reliability would also increase the false rejection ratio, making the
systems unusable.
There's a paper on this in CARDIS '2000 of last September.
Jaap-Henk
--
Jaap-Hen
at http://www.hrl.il.ibm.com/proactive
Actually, this sounds more like applying fault tolerance (e.g. byzantine
agreement) techniques to increase security and dependability of your system.
Also related are secret sharing techniques and methods to securely compute a
function on a partially truste
ked quite
usable and user friendly to me - as far as any secure email product could ever
be completely be user friendly... The user has to do more stuff than usual, and
has to have some understanding of what is going on in order to judge whether
his/her security requirements have been met.
Jaap-Henk
ision for SHA1: M0 = h'(X)||00..0||L, and M1 =
> h'(X*)||00..0||L.
>
> Comments?
>
> - --John Kelsey, [EMAIL PROTECTED]
>
> -BEGIN PGP SIGNATURE-
> Version: PGPfreeware 6.5.1 Int. for non-commercial use
> <http://www.pgpinternational.com>
> Comment:
on the plaintext leaving the base station on the fixed
network.
Jaap-Henk
--
Jaap-Henk Hoepman | Come sail your ships around me
Dept. of Computer Science | And burn these bridges down
University of Twente | Nick Cave - "Ship Song"
Email: [EMAIL PROT
s of the Ministry
of Internal Affairs, who would receive the relevant information.
Jaap-Henk
--
Jaap-Henk Hoepman | Come sail your ships around me
Dept. of Computer Science | And burn these bridges down
University of Twente | Nick Cave - "Ship Song"
Ema
roof" devices were.
>
These attacks on magstripe based cards have been around for ages... For even
more clever attacks (without merchant cooperation) on outdoor ATMs see
ftp://ftp.sri.com/risks/risks-20.31
Fake ATM front panel copies cards and PINs (Ulf Lindqvist)
Jaap-Henk
--
J
t; www.amazon.com, and direct it to your own site. Then you can offer your
> bogus cert for www.amazon.com and get it accepted.
Alternatively, the attacker could just register the domain anazon.com (if only
amazon.con were possible :-) or amazon.be ("Look, Amazon's just started a
Belgian b
gt; Do you know where to order this? None of the amazon.com sites has it, nor doe
> s barnesandnoble.com.
Ponsen and Looijen is _not_ a publisher, just a printer printing a lot of PhD
theses. I'm afraid the only way to get a copy is as explained on
http://www.xs4all.nl/~brands/order.tx
he
capacitor to supply power during 10 cycles must be 0.1 W * 10us (u = mu)
Then 1/2 C V^2 = 25/2 C = 0.1 W * 10us
In other words, the capacity of C equals 80nF.
The trick now is to embed a capacitor of this size on the smart card chip
itself such that it becomes even more difficult to monit
18 matches
Mail list logo