I can't be the first person to have noticed this, but...

2000-12-17 Thread Matt Blaze
The (now expired) RSA patent number, 4,405,829, is prime. -matt

AES winner(s) to be announced 11am Monday

2000-09-29 Thread Matt Blaze
http://csrc.nist.gov/encryption/aes/ -matt

Re: Lowercase compresses better?

2000-09-29 Thread Matt Blaze
In reading http://apachetoday.com/news_story.php3?ltsn=2000-09-27-001-01-OP-CY-LF I came across the following guideline for writing Apache documentation: HTML tags should be lowercase wherever possible. In other words, 'a href="foo.html"Link/a' is preferred over 'A

Carnivore article in October CACM _Inside_Risks_

2000-09-01 Thread Matt Blaze
Steve Bellovin and I wrote a guest column, "Tapping, Tapping on my Network Door" in Peter Neumann's "Inside Risks" page for the October, 2000 Communications of the ACM. You can find it at http://www.crypto.com/papers/carnvore-risks.html -matt

Carnivore article in October CACM _Inside_Risks_ (fwd)

2000-09-01 Thread Matt Blaze
Please note corrected URL: Steve Bellovin and I wrote a guest column, "Tapping, Tapping on my Network Door" in Peter Neumann's "Inside Risks" page for the October, 2000 Communications of the ACM. You can find it at http://www.crypto.com/papers/carnivore-risks.html -matt

Open Source Wiretapping

2000-07-21 Thread Matt Blaze
On Monday, July 24, 2000, the House Judiciary Committee's Subcommittee on the Constitution will be holding hearings on "Fourth Amendment Issues Raised by the FBI's 'Carnivore' Program." The hearings will be in the Rayburn building, room 2141 at 1pm, for those interested in attending. There will

Re: Extracting Entropy?

2000-06-19 Thread Matt Blaze
I should point out that this construction is not designed to obscure the input from the output (especially under differential probing), only to give you m output bits that depend (each in a different way) on the entire input. OK, so if I've got a passphrase of arbitrary length, and I wish to

Re: Extracting Entropy?

2000-06-19 Thread Matt Blaze
OK, so if I've got a passphrase of arbitrary length, and I wish to condense it to make a key of length n bits (n 160), what's the approved method(s) of doing that? I assume it goes without saying that we wish to preserve as much entropy as we can, but I'll say it anyway. I've thought

Re: Critics blast Windows 2000's quiet use of DES instead of 3DES

2000-05-18 Thread Matt Blaze
Declan writes: Their beef: If two Windows 2000 computers without triple-DES are talking and the system administrator has configured triple-DES-only links, only single-DES gets used. The only error shown is an invisible one -- in an audit log file -- so users may have a false

Re: Critics blast Windows 2000's quiet use of DES instead of 3DES

2000-05-18 Thread Matt Blaze
I have no idea if the KRA is still in business, and, as an employee of NAI, I don't really care. It doesn't affect me. Strong crypto is available. There is nothing that the NSA can do about that. If they are smart, they have concentrated their efforts on breaking RSA, Diffie-Hellman and

Re: IP: Gates, Gerstner helped NSA snoop - US Congressman

2000-04-13 Thread Matt Blaze
While writing about OS back-doors, I said: I'm incredibly skeptical that Microsoft, IBM, or any other vendor intentionally provides back-doors for the NSA or anyone else. This was too strong, because there is in fact a counterexample that I'd forgotten while composing that e-mail. Jim

crypto.com

2000-03-01 Thread Matt Blaze
bw.022900/200601577ticker=EURO I have no idea what "the technology" is, but all cryptographers know that the only "absolutely" unbreakable cipher that can ever exist for "open circuits" is the one-time pad, which not only requires the use of a key, but requires that the key be as long as the message, and used only once. -Matt Blaze, 29 February 2000

Re: Unrestricted crypto software web posting

2000-01-20 Thread Matt Blaze
On Thu, 20 Jan 2000, Matt Blaze wrote: Consider it done; the alias: [EMAIL PROTECTED] now appends to http://www.crypto.com/exports/mail.txt, and also mails to [EMAIL PROTECTED] (currently empty, but that will change as people use it). Do you agree to surrender any rights

Biryukov/Shamir paper available

1999-12-09 Thread Matt Blaze
I've gotten permission from Adi Shamir to distribute a draft of the Biryukov/Shamir A5/1 attack paper, so it's now available (in PostScript format) on my web site: http://www.crypto.com/papers/others/a5.ps -matt

KeyNote toolkit and reference implementation available

1999-10-02 Thread Matt Blaze
of Matt Blaze, Joan Feigenbaum and John Ioannidis of ATT Laboratories and Angelos Keromytis of the University of Pennsylvania. KeyNote provides a standard, common mechanism for managing security policy, credentials, access control, and authorization. An application built with KeyNote simply asks

KeyNote RFC now available

1999-09-30 Thread Matt Blaze
The official version of the RFC describing "The KeyNote Trust Management System, Version 2" has been published as RFC 2704. This document provides the complete, official description of the KeyNote language syntax and semantics as well as a basic discussion of the architectural implications of

Re: Why did White House change its mind on crypto?

1999-09-18 Thread Matt Blaze
Your argument is straight to the point. Since you are unfamiliar with the operations of the current FISA court, you obviously can't be blamed for not being aware of the fact that there is an US court in operation today that conducts its proceedings quite differently from the way proceedings

Re: NSA key in MSFT Crypto API

1999-09-03 Thread Matt Blaze
Here's what I said about this on another list: I must admit that this doesn't make much sense to me. I was at Crypto, but I must have missed the rump session talk in question (and it's entirely possible that the talk occurred anyway - I was out of the room for a good deal of that session). In

KeyNote v2 trust management toolkit now available for beta testing

1999-04-30 Thread Matt Blaze
We are pleased to announce the beta release of the KeyNote v2 Trust Management Toolkit and Reference Implementation for BSD Unix and Linux. The toolkit was developed by Angelos Keromytis of the University of Pennsylvania. KeyNote is a small, flexible trust management system designed to be