Re: Simson Garfinkel analyses Skype - Open Society Institute

2005-02-02 Thread Ian G
Ian Brown wrote: I'd guess that many of the developing-world human rights groups funded by OSI would have legitimate reason to worry about wiretapping conducted by well-resourced opponents in their governments. They might also discuss information on a secure communication facility that they wou

World-Renowned Cryptographer Arjen Lenstra Joins Bell Labs

2005-02-02 Thread R.A. Hettinga
mysan.de/international - World-Renowned Cryptographer Arjen Lenstra Joins Bell Labs Adds Valuable Talent to Lucent Technologies' Network Security Research MURRAY HILL, N.J., Feb. 1 /PRNewswire-FirstCall/ -- Lucent Technologies (NYSE:LU)

how to tell if decryption was successfull?

2005-02-02 Thread Andreas
[newbie here] I was wondering how can one tell if some data was successfully decrypted. Isn't there an assumption going on about what the cleartext data should be? Text? Image? ZIP file? Ziped jpeg? Another cyphertext? rot-13?

FSTC Announces Availability of FSTC Counter-Phishing Project Whitepaper and Supporting Documents

2005-02-02 Thread R.A. Hettinga
--- begin forwarded text Date: Tue, 01 Feb 2005 14:38:24 -0500 From: Zachary Tumin <[EMAIL PROTECTED]> Subject: FSTC Announces Availability of FSTC Counter-Phishing Project Whitepaper and Supporting Documents To: 'Members' Reply-To: [EMAIL PROTECTED] Thread-Index: AcUIlZgU2CHR/ELITdGfx45tInzmr

Dell to Add Security Chip to PCs

2005-02-02 Thread R.A. Hettinga
The Wall Street Journal February 1, 2005 11:04 a.m. EST Dell to Add Security Chip to PCs By GARY MCWILLIAMS Staff Reporter of THE WALL STREET JOURNAL February 1, 2005 11:04 a.m. HOUSTON -- Dell Inc. today is expected

Re: Is 3DES Broken?

2005-02-02 Thread Daniel Carosone
On Mon, Jan 31, 2005 at 10:38:53PM -0500, Steven M. Bellovin wrote: > When using CBC mode, one should not encrypt more than 2^32 64-bit > blocks under a given key. That comes to ~275G bits, which means that > on a GigE link running flat out you need to rekey at least every 5 > minutes, which is

Call For Papers : HITB Security Conference Bahrain 2005

2005-02-02 Thread alpha
Hack In The Box Security Conference 2005 : Bahrain -- Greetings, We are inviting individuals or groups who are interested in computer and network security, challenges and practices to send in their papers for inclusion in HITBSecConf2005 Bahrain. Th

Re: Is 3DES Broken?

2005-02-02 Thread james hughes
On Jan 31, 2005, at 10:38 PM, Steven M. Bellovin wrote: When using CBC mode, one should not encrypt more than 2^32 64-bit blocks under a given key. That comes to ~275G bits, which means that on a GigE link running flat out you need to rekey at least every 5 minutes, which is often impractical. Si

Re: how to tell if decryption was successfull?

2005-02-02 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, Andreas writes: >[newbie here] > >I was wondering how can one tell if some data was successfully >decrypted. Isn't there an assumption going on about what the cleartext >data should be? Text? Image? ZIP file? Ziped jpeg? Another cyphertext? >rot-13? There are a l

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Trei, Peter
Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Peter Trei Tyler Durden > ANyone familiar with computer architectures and chips able to > answer this > question: > > Th

Re: how to tell if decryption was successfull?

2005-02-02 Thread Matt Crawford
On Feb 1, 2005, at 13:29, Andreas wrote: I was wondering how can one tell if some data was successfully decrypted. Isn't there an assumption going on about what the cleartext data should be? Text? Image? ZIP file? Ziped jpeg? Another cyphertext? rot-13? Embedded checksums or hash codes added bef

Re: how to tell if decryption was successfull?

2005-02-02 Thread Jerrold Leichter
| [newbie here] | | I was wondering how can one tell if some data was successfully decrypted. | Isn't there an assumption going on about what the cleartext data should be? | Text? Image? ZIP file? Ziped jpeg? Another cyphertext? rot-13? Without some additional information, there's no way to tell a

Re: Call For Papers : HITB Security Conference Bahrain 2005

2005-02-02 Thread Adam Shostack
Posting to Dave Aitel's DailyDave list, HD Moore complained that he had not been reimbursed for 2003. The organizers responded that payment is forthcoming. Richard Thieme suggested that the correct response is to ensure you put forth no money to speak at this event. On Tue, Feb 01, 2005 at 06:

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Erwann ABALEA
On Wed, 2 Feb 2005, Trei, Peter wrote: > Seeing as it comes out of the TCG, this is almost certainly > the enabling hardware for Palladium/NGSCB. Its a part of > your computer which you may not have full control over. Please stop relaying FUD. You have full control over your PC, even if this one

MSN Belgium to use eID cards for online checking

2005-02-02 Thread R.A. Hettinga
The Register Biting the hand that feeds IT The Register » Internet and Law » Digital Rights/Digital Wrongs » Original URL: http://www.theregister.co.uk/2005/02/01/msn_belgium_id_cards/ MSN Belgium to use eID cards for

Peppercoin Small Payments Processing Suite Available to First Data Channels

2005-02-02 Thread R.A. Hettinga
Yahoo! Finance Press Release Source: Peppercoin Peppercoin Small Payments Processing Suite Available to First Data Channels Wednesday February 2, 9:03 am ET Small Transaction Suite Certified for Sale Through Processor's Merchant Acquiring

Re: Is 3DES Broken?

2005-02-02 Thread bear
On Mon, 31 Jan 2005, Steven M. Bellovin wrote: >>[Moderator's note: The quick answer is no. The person who claims >> otherwise is seriously misinformed. I'm sure others will chime >> in. --Perry] > >I'll be happy to second Perry's comment -- I've seen no evidence >whatsoever to suggest that it'

Re: Is 3DES Broken?

2005-02-02 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, bear writes: > > >On Mon, 31 Jan 2005, Steven M. Bellovin wrote: > > >>>[Moderator's note: The quick answer is no. The person who claims >>> otherwise is seriously misinformed. I'm sure others will chime >>> in. --Perry] >> >>I'll be happy to second Perry's comment -

Can you help develop crypto anti-spoofing/phishing tool ?

2005-02-02 Thread Amir Herzberg
We develop TrustBar, a simple extension to FireFox (& Mozilla), that displays the name and logo of SSL protected sites, as well as of the CA (so users can notice the use of untrusted CA). I think it is fair to say that this extension fixes some glitches in the deployment of SSL/TLS, i.e. in the

Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Ian G
Erwann ABALEA wrote: On Wed, 2 Feb 2005, Trei, Peter wrote: Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Please stop relaying FUD. You have full control over your

VeriSign and Conflicts of Interest

2005-02-02 Thread Ian G
((( Financial Cryptography Update: VeriSign and Conflicts of Interest ))) February 02, 2005 http://www.financialcryptography.com/mt/archives/000332.html Adam and I have written to ICANN on the VeriSig

Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Dan Kaminsky
Uh, you *really* have no idea how much the black hat community is looking forward to TCPA. For example, Office is going to have core components running inside a protected environment totally immune to antivirus. Since these components are going to be managing cryptographic operations, the "we

Re: Can you help develop crypto anti-spoofing/phishing tool ?

2005-02-02 Thread Daniel Carosone
On Wed, Feb 02, 2005 at 10:11:54PM +0200, Amir Herzberg wrote: > We develop TrustBar, a simple extension to FireFox (& Mozilla), that > displays the name and logo of SSL protected sites, as well as of the CA > (so users can notice the use of untrusted CA). Other merits of the idea aside, if the

Re: Can you help develop crypto anti-spoofing/phishing tool ?

2005-02-02 Thread Ian G
Daniel Carosone wrote: On Wed, Feb 02, 2005 at 10:11:54PM +0200, Amir Herzberg wrote: We develop TrustBar, a simple extension to FireFox (& Mozilla), that displays the name and logo of SSL protected sites, as well as of the CA (so users can notice the use of untrusted CA). Other merits o

Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread R.A. Hettinga
Newswise Source: University of Delaware Released: Tue 01-Feb-2005, 13:10 ET Researchers Combat Terrorists by Rooting Out Hidden Messages Libraries Science News Keywords STEGANOGRAPHY, STEGANALYSIS, HIDDEN MESSAGES, DIGITAL IMAGES, CRYPTOG

RE: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Alan
On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote: > At 02:07 PM 2/1/2005, Tyler Durden wrote: > > >Counter-stego detection. > > > >Seems to me a main tool will be a 2-D Fourier analysis...Stego will > >certainly have a certain "thumbprint", depending on the algorithm. Are > >there certain i

RE: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread J.A. Terranson
On Wed, 2 Feb 2005, Alan wrote: > If you really want to send secret messages, just send it in the chaff in > spam. Everyone is programmed to ignore it or filter it out. Yeah, but it doesn't make for great story copy or funding proposals ;-) -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95

Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread AW
Just herd of this http://www.spammimic.com/ AW Alan wrote: On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote: If you really want to send secret messages, just send it in the chaff in spam. Everyone is programmed to ignore it or filter it out. --