anguage in Section 2 (b)(1) about
possession, use, manufacture, etc., would seem to have the same kind of
broadness we have seen misused in the DMCA, covering people who sell NAT and
encryption tools that might be used by someone who sends email while
attempting to defraud a communications servi
Derek Atkins <[EMAIL PROTECTED]> wrote:
> Were there really 750 Million Passengers flying through ATL?
No, 75 million. If you look at my message again I did correctly say 750,000
for the 1% false positive figure, although I did not type a comma to make it
easier to read.
> Therefore, a better que
at the less busy airports (source
Airports Council International, 10 Busiest Airports in US by Number of
Passengers, 2001).
-- sidney markowitz
[EMAIL PROTECTED]
-
The Cryptography Mailing List
Unsubscribe by s
Ed Gerck <[EMAIL PROTECTED]> wrote:
> For each AES-128 plaintext/ciphertext (c,p) pair with length
> equal to or larger than the unicity distance, there exists exactly
> one key k such that c=AES-128-Encrypt(p, k).
Excuse my naivete in the math for this, but is it relevant that the unicity
distan
Ralf Senderek" <[EMAIL PROTECTED]> asked:
> And if one loves to learn about every single one of them,
> can you (or others) give some references ?
The page titled "Prescriptions for Applications that are Vulnerable to the
Adaptive Chosen Ciphertext Attack on PKCS #1 v1.5" at URL
http://www.rsasec
Scott G. Kelly <[EMAIL PROTECTED]> wrote:
> I seem to recall reading somewhere that there is some issue
> with directly encrypting data with an
> RSA public key, perhaps some vulnerability
The short answer is that you should use one of the standard padding modes
that are designed for RSA encryptio
Adam Back <[EMAIL PROTECTED]> wrote:
> See for example Rogaway's arguments about limited value of
> defending against extension forgery attacks in XCBC:
[... quote snipped ...]
> http://csrc.nist.gov/encryption/modes/workshop2/presentations/xcbc.pdf
This doesn't contain the paragraph that you quot
Ed Gerck <[EMAIL PROTECTED]> wrote:
> A minor nit, but sometimes looking into why
> things were devised is helpful.
> What I explained can be found in
> http://csrc.nist.gov/encryption/modes/workshop2/report.pdf
Thank you, that was really helpful in seeing the motivation for the work that led to
t
Adam Back <[EMAIL PROTECTED]> wrote:
> But the salt doesn't increase the MAC length. It just frustrates
> attempts to collect message+MAC pairs to find a collision.
[...]
> There is still probability 1/2^m of finding a collision given two
> random messages, whether the salt has size 0 or 64.
No,
Ed Gerck" <[EMAIL PROTECTED]> said:
> No -- these are all independent things. One can build an RMAC wih SHA-1.
> An RMAC does not have to use an HMAC scheme. One can also have an
> HMAC hash-based MAC algorithm using a block cipher, that is not an RMAC.
Some quotes from the paper:
"This paper def
[EMAIL PROTECTED]
> I want to understand the assumptions (threat models) behind the
> work factor estimates. Does the above look right?
I just realized something about the salt in the RMAC algorithm, although it
may have been obvious to everyone else:
RMAC is equivalent to a HMAC hash-based MAC a
Ed Gerck" <[EMAIL PROTECTED]>
> It does to (as you can read in the paper). BTW, the "easily" applies to the
case
> WITHOUT salt
Well, to be really pedantic the paper never says that it is "easy" only that
it has a work factor of the square root of the number of possible MAC strings
without salt, a
"bear" <[EMAIL PROTECTED]> asked:
> But why does that buy me the ability to "easily" make a forgery?
It doesn't. As described in the paper all you can do with it is the following:
Mallory discovers that a message from Alice "Buy a carton of milk" and another
message from Alice "Get a dozen eggs"
"Bill Frantz" <[EMAIL PROTECTED]> asked:
> Does anyone run a service that will check an IP address for open ports?
> (I'd like to test my firewall.)
A Google search for 'nmap test' came up with this as the first hit:
http://www.linux-sec.net/Audit/nmap.test.gwif.html
It seems to offer that serv
Perry E. Metzger <[EMAIL PROTECTED]> wrote:
> But if you can't simulate the system, that implies that the challenger
> has to have stored the challenge-response pairs because he can't just
> generate them, right? That means that only finitely many are likely to
> be stored. Or was this thought of
[Perry message forwarded a notice of a paper on an attack against PGP and
GnuPG]
A posting on bugtraq in response said, in part:
> From: "Werner Koch" <[EMAIL PROTECTED]>
[...]
> Countermeasures are defined in the OpenPGP drafts since October 2000.
>
> This MDC (Manipulation Detection Code) feat
> Does anyone else notice the contradiction in these two paragraphs?
> First Bruce says that businesses can reasonably be content with 1024 bit
> keys, then he appears shocked that Lucky Green still has a 1024 bit key?
"The big news is" does not mean the same as "I'm shocked that". He appears to
Someone on another mailing list pointed me to this posting by Dan
Bernstein on sci.crypt newsgroup:
http://groups.google.com/groups?hl=en&selm=2002Jan1608.53.39.5497%40cr.yp.to
[begin quote]
From: D. J. Bernstein ([EMAIL PROTECTED])
Subject: Re: Strength of PGP vs SSL
Newsgroups: comp.securi
On Sun, 2002-01-27 at 14:07, [EMAIL PROTECTED] wrote:
> The issue then is that biometric represents a particularly
> difficult shared-secret that doesn't have to be memorized
Shared "secret"? People don't leave a copy of their PIN on every water
glass they use.
-- sidney
--
On Wed, 2002-01-23 at 09:59, Peter Fairbrother wrote:
> I googled "hippus movement", and only got 3 hits
A search for 'hippus eye' (two separate words, not quoted as a phrase)
turns up a bit more. The only references for its use in biometrics were
from Iridian or the scientist who is now at Iridi
Here's something by Ron Rivest about RC4 security that will give you a
simple overview before delving into the articles that Steve Bellovin
cited in his message. Note that Steve Bellovin's link includes the two
papers on RC4 weaknesses that Rivest references.
http://www.rsasecurity.com/rsalabs/te
I haven't seen mention of this on the mailing list and it is new enough
that it doesn't show up in a google search as of the moment I am typing
this.
Looking at http://www.cryptoheaven.com it appears they provide anonymous
encrypted services including email, instant messaging (chat), and server
b
The URL Kevin posted is slashdotted because of this article
http://slashdot.org/articles/01/10/15/1727249.shtml
Based on the comments on slashdot it appears that Niels Provos, whose
program found no steganography in millions of images on the web, was able
to detect and decode an example image
A little over a month ago Perry Metzger asked about free assembler
language implementations of Rijndael for x86. Helger Lipmaa, whose
commercial assembler language version seems to be the fastest,
mentioned Brian Gladman as having the best free C implementation.
Gladman's web page now says that he
Here's a quote from the Washington Post last Sunday, 23 Sept, 2001.
The URL
http://www.washingtonpost.com/wp-dyn/articles/A10701-2001Sep22.html
is good for 2 weeks from then:
-
"I've been getting e-mails from all over the country, from people both
on the left and the right, concerne
John Young wrote:
> Remote acquisition of electronic emissions, say from outside a
> home, are not currently prohibited by law as far as I know. And
> the language of the thermal imaging decision makes it applicable
> to any technology not commonly in use.
IANAL, but when I read the decision it s
26 matches
Mail list logo