Re: Venona not all decrypted?

2005-10-13 Thread Steven M. Bellovin
Have a look at http://www.nsa.gov/publications/publi00039.cfm . The one-time pad was used to superencrypt a codebook; two different codebooks were used. Most of the successful decryptions were done by 1952; there was some additional help from a partial codebook recovered in 1953. Here's the

NSA Suite B Cryptography

2005-10-13 Thread Perry E. Metzger
"Fact Sheet on NSA Suite B Cryptography" http://www.nsa.gov/ia/industry/crypto_suite_b.cfm Perry - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Re: US Banks: Training the next generation of phishing victims

2005-10-13 Thread Stephan Neuhaus
Peter Gutmann wrote: Banks like Bank of America have taken some flak in the past for their awful online banking security practices. [...] For an example of how you can do it well and still have a well-designed user interface, consider SaarLB (http://www.saarlb.de). The homepage is unencrypt

Re: US Banks: Training the next generation of phishing victims

2005-10-13 Thread Peter Gutmann
Sidney Markowitz <[EMAIL PROTECTED]> writes: >It looks like they are all getting their web sites from the same Hack-In-A- >Box. My original comment on that was "Looks like they got their security certification from the same cornflakes packet" :-). An anonymous contributor sent in the following c