Re: Interesting bit of a quote

2006-07-16 Thread Anne & Lynn Wheeler
Travis H. wrote: 1) Some kind of physical authenticity, such as signing one's name on the media as they are produced (this assumes the signer is not corruptible), or applying a frangible difficult-to-duplicate seal of some kind (this assumes access controls on the seals). 2) Some kind of hash cha

Re: Interesting bit of a quote

2006-07-16 Thread Travis H.
On 7/15/06, John Kelsey <[EMAIL PROTECTED]> wrote: Another solution is to use cryptographic audit logs. Bruce Schneier and I did some work on this several years ago, using a MAC to authenticate the current record as it's written, and a one-way function to derive the next key. (This idea was app

Re: Interesting bit of a quote

2006-07-16 Thread John Kelsey
>From: "Travis H." <[EMAIL PROTECTED]> >Sent: Jul 14, 2006 11:22 PM >To: David Mercer <[EMAIL PROTECTED]> >Cc: cryptography@metzdowd.com >Subject: Re: Interesting bit of a quote ... >The problem with this is determining if the media has been replaced. >Absent other protections, one could simply wr

Re: Interesting bit of a quote

2006-07-16 Thread Jason Holt
On Fri, 14 Jul 2006, Travis H. wrote: Absent other protections, one could simply write a new WORM media with falsified information. I can see two ways of dealing with this: 1) Some kind of physical authenticity, such as signing one's name on the media as they are produced (this assumes the sig