The (now expired) RSA patent number, 4,405,829, is prime.
-matt
http://csrc.nist.gov/encryption/aes/
-matt
In reading
http://apachetoday.com/news_story.php3?ltsn=2000-09-27-001-01-OP-CY-LF
I came across the following guideline for writing Apache documentation:
HTML tags should be lowercase wherever possible. In other
words, 'a href="foo.html"Link/a' is preferred over
'A
Steve Bellovin and I wrote a guest column, "Tapping, Tapping on my
Network Door" in Peter Neumann's "Inside Risks" page for the October,
2000 Communications of the ACM.
You can find it at
http://www.crypto.com/papers/carnvore-risks.html
-matt
Please note corrected URL:
Steve Bellovin and I wrote a guest column, "Tapping, Tapping on my
Network Door" in Peter Neumann's "Inside Risks" page for the October,
2000 Communications of the ACM.
You can find it at
http://www.crypto.com/papers/carnivore-risks.html
-matt
On Monday, July 24, 2000, the House Judiciary Committee's Subcommittee
on the Constitution will be holding hearings on "Fourth Amendment
Issues Raised by the FBI's 'Carnivore' Program." The hearings will be
in the Rayburn building, room 2141 at 1pm, for those interested in
attending. There will
I should point out that this construction is not designed to obscure the
input from the output (especially under differential probing), only
to give you m output bits that depend (each in a different way) on
the entire input.
OK, so if I've got a passphrase of arbitrary length, and I wish to
OK, so if I've got a passphrase of arbitrary length, and I wish to
condense it to make a key of length n bits (n 160), what's the
approved method(s) of doing that?
I assume it goes without saying that we wish to preserve as much entropy
as we can, but I'll say it anyway.
I've thought
Declan writes:
Their beef: If two Windows 2000 computers without triple-DES are
talking and the system administrator has configured triple-DES-only
links, only single-DES gets used. The only error shown is an invisible
one -- in an audit log file -- so users may have a false
I have no idea if the KRA is still in business, and, as an employee of
NAI, I don't really care. It doesn't affect me.
Strong crypto is available. There is nothing that the NSA can do about
that. If they are smart, they have concentrated their efforts on breaking
RSA, Diffie-Hellman and
While writing about OS back-doors, I said:
I'm incredibly skeptical that Microsoft, IBM, or any other vendor
intentionally provides back-doors for the NSA or anyone else.
This was too strong, because there is in fact a counterexample that I'd
forgotten while composing that e-mail.
Jim
bw.022900/200601577ticker=EURO
I have no idea what "the technology" is, but all cryptographers know that
the only "absolutely" unbreakable cipher that can ever exist for "open
circuits" is the one-time pad, which not only requires the use of a key,
but requires that the key be as long as the message, and used only once.
-Matt Blaze, 29 February 2000
On Thu, 20 Jan 2000, Matt Blaze wrote:
Consider it done; the alias:
[EMAIL PROTECTED]
now appends to http://www.crypto.com/exports/mail.txt, and also mails to
[EMAIL PROTECTED] (currently empty, but that will change as people use it).
Do you agree to surrender any rights
I've gotten permission from Adi Shamir to distribute a draft of
the Biryukov/Shamir A5/1 attack paper, so it's now available (in
PostScript format) on my web site:
http://www.crypto.com/papers/others/a5.ps
-matt
of Matt Blaze, Joan Feigenbaum and John Ioannidis
of ATT Laboratories and Angelos Keromytis of the University of
Pennsylvania.
KeyNote provides a standard, common mechanism for managing security
policy, credentials, access control, and authorization. An
application built with KeyNote simply asks
The official version of the RFC describing "The KeyNote Trust Management
System, Version 2" has been published as RFC 2704. This document
provides the complete, official description of the KeyNote
language syntax and semantics as well as a basic discussion of the
architectural implications of
Your argument is straight to the point. Since you are unfamiliar with the
operations of the current FISA court, you obviously can't be blamed for not
being aware of the fact that there is an US court in operation today that
conducts its proceedings quite differently from the way proceedings
Here's what I said about this on another list:
I must admit that this doesn't make much sense to me.
I was at Crypto, but I must have missed the rump session talk in question
(and it's entirely possible that the talk occurred anyway - I was out of the
room for a good deal of that session). In
We are pleased to announce the beta release of the KeyNote v2 Trust
Management Toolkit and Reference Implementation for BSD Unix and
Linux. The toolkit was developed by Angelos Keromytis of the
University of Pennsylvania.
KeyNote is a small, flexible trust management system designed to be
19 matches
Mail list logo