At 03:37 PM 4/12/04 -0400, Perry E. Metzger wrote:
QC can only run over a dedicated fiber over a short run, where more
normal mechanisms can work fine over any sort of medium -- copper, the
PSTN, the internet, etc, and can operate without distance limitation.
Nice essay. I especially liked the
http://www.cryptonomicon.net/modules.php?name=Newsfile=printsid=742
Key Splitting : First (and Second) Person Key Escrow
Date: Monday, April 12 @ 08:00:00 EDT
Topic: Algorithms / Asymmetric Cipher
One of our missions here at Cryptonomicon.Net is to advocate the use of
appropriate
Hello,
I had this idea about reversing the roles of the actors in a typical DRM
system, and thinking about where it might lead. I hope the idea will
stimulate some discussion: is the idea dead on arrival? Does it have
merit? Is it feasible? Is there something like this being built today?
Here
VaX#n8 wrote:
I've done a survey of the various crypting file system tools, would anyone
be interested in a summary of available options?
This would likely be an interesting read for many on the list. Perhaps
you can put up a PDF somewhere?
Cheers,
Ivan
I haven't seen this mentioned on the list, so I thought I'd toss it
out. According to http://www.nstissc.gov/Assets/pdf/fact%20sheet.pdf ,
AES is acceptable for protecting Top Secret data. Here's the crucial
sentence:
The design and strength of all key lengths of the AES algorithm
[EMAIL PROTECTED] wrote:
Hi,
I'm looking for interesting and unusal defitions of the
term Security (or secure).
I'm fully aware that it is difficult or impossible to give
a precise, compact, and universal definitions, and some
book authors explicitely say so. However, there are definitions
(or
Jani Nurminen wrote:
[...]
But what content could the consumer-become-content-provider, the
ordinary person, you or me (let's call this actor the user), produce?
What could be interesting and rare for the corporation but found in
abundance from the user? One answer is personal data.
Upon
According to [EMAIL PROTECTED]:
I'm looking for interesting and unusal defitions of the
term Security (or secure).
See http://en.wikipedia.org/wiki/Security
ciao...
--
Lars Eilebrecht
[EMAIL PROTECTED]
-
The Cryptography
At 08:01 AM 4/14/2004, [EMAIL PROTECTED] wrote:
Hi,
I'm looking for interesting and unusal defitions of the
term Security (or secure)
there was a discussion on PAIN taxonomy for security earlier in the year
... misc. references
http://www.garlic.com/~lynn/aadsm17.htm#3 Non-repudiation (was RE:
On Tue, Apr 13, 2004 at 11:05:10PM +0300, Jani Nurminen wrote:
But what content could the consumer-become-content-provider, the
ordinary person, you or me (let's call this actor the user), produce?
What could be interesting and rare for the corporation but found in
abundance from the user?
Jani Nurminen wrote:
I had this idea about reversing the roles of the actors in a typical DRM
system, and thinking about where it might lead.
[...]
This kind of application of DRM would probably guarantee privacy of the
personal data of each individual person, while at the same time allow
I missed that announcement too -- but Wikipedia, the web-based Free
Encyclopedia, caught it! See Wikipedia on AES at:
http://en.wikipedia.org/wiki/AES
The Wikipedia module on AES Security has a link to the same NSA fact sheet
Steve mentioned.
I was surprised. I thought, as in so many other
12 matches
Mail list logo