Re: Fwd: Potential SHA 1 Hack Using Distributed Computing - Near Miss(es) May be Good Enough

2007-08-15 Thread Paul Hoffman
At 4:49 PM -0300 8/14/07, Mads Rasmussen wrote: Have a look at http://boinc.iaik.tugraz.at/sha1_coll_search Did that, in specific Note the lack of information about what they are actually doing. "We develop

Re: Re: Fwd: Potential SHA 1 Hack Using Distributed Computing - Near Miss(es) May be Good Enough

2007-08-15 Thread Christian Rechberger
Quoting Paul Hoffman <[EMAIL PROTECTED]>: At 11:00 PM -0700 8/13/07, Aram Perez wrote: Anyone know more about this? I have the same question. I could not find any description of *why* they think that finding near-misses is going to help the research. It's not clear if they are taking thei

Re: Re: Fwd: Potential SHA 1 Hack Using Distributed Computing - Near Miss(es) May be Good Enough

2007-08-15 Thread Paul Hoffman
At 11:31 PM +0200 8/14/07, Christian Rechberger wrote: The mentioned article is indeed confusing, the information in there took apparently several hops. Welcome to the world of public cryptography! :-) At least I haven't seen anyone so far suggest that you will find pre-images. To address yo

Re: Susan Landau Op Ed on new NSA powers

2007-08-15 Thread David G. Koontz
Alex Alten wrote: > It seems that a large chunk (and probably relative soon nearly all) > voice is now via VoIP. And to date, Skype not withstanding, this has > all been cleartext traffic. Using router netflow records, etc., one > can now pinpoint any phone conversation and then do a pcap dump.

New DoD encryption mandate

2007-08-15 Thread Steven M. Bellovin
According to http://www.fcw.com/article103467-08-13-07-Print the US Defense Department has mandated that all sensitive but unclassified information on mobile devices must be encrypted in compliance with FIPS 140-2. "Mobile devices" include laptops, PDAs, CDs, flash drives, etc. --

RE: New DoD encryption mandate

2007-08-15 Thread Charles Jackson
Also interesting is the requirement that all DOD computers include TPM (1.2 or higher). See next to last paragraph of the memorandum at http://iase.disa.mil/policy-guidance/dod-dar-tpm-decree07-03-07.pdf This memo was pointed to by the story referenced below. Chuck Jackson -Original Mess

Re: Re: Re: Fwd: Potential SHA 1 Hack Using Distributed Computing - Near Miss(es) May be Good Enough

2007-08-15 Thread Christian Rechberger
Quoting Paul Hoffman <[EMAIL PROTECTED]>: At 11:31 PM +0200 8/14/07, Christian Rechberger wrote: The mentioned article is indeed confusing, the information in there took apparently several hops. Welcome to the world of public cryptography! :-) At least I haven't seen anyone so far suggest

Re: New DoD encryption mandate

2007-08-15 Thread Ed Gerck
The first is simply a MSFT Vista requirement for BitLocker file encryption. The second is for example present in ACER laptops (Aspire 5920) as eLock -- it allows you to protect and then unlock storage devices that can be mounted as a file system when plugged into the trusted system (the laptop), or