Re: SHA-1 results available

2005-02-23 Thread Florian Weimer
* Jack Lloyd: > http://theory.csail.mit.edu/~yiqun/shanote.pdf Thanks for the pointer. > No real details, just collisions for 80 round SHA-0 (which I just confirmed) > and 58 round SHA-1 (which I haven't bothered with), plus the now famous work > factor estimate of 2^69 for full SHA-1. > > As us

Re: I'll show you mine if you show me, er, mine

2005-02-23 Thread "Hal Finney"
Markus Jakobsson is a really smart guy who's done some cool stuff, so I think this is probably better than it sounds in the article. His web site is http://www.informatics.indiana.edu/markus/ but I don't see any papers there that sound like what the article describes. I tried to reverse engineer

Re: I'll show you mine if you show me, er, mine

2005-02-23 Thread James A. Donald
-- On 24 Feb 2005 at 2:29, Peter Gutmann wrote: > Isn't this a Crypto 101 mutual authentication mechanism (or > at least a somewhat broken reinvention of such)? If the > exchange to prove knowledge of the PW has already been > performed, why does A need to send the PW to B in the last > step?

subscribe cypherpunks

2005-02-23 Thread Abraham Wolk
subscribe cypherpunks

Rapid Prototyping of Courseware

2005-02-23 Thread KMSI
Title: Rapid Prototyping of Courseware  Rapid Prototyping of Courseware  E-Learning Return On Investment (ROI) Web Seminar Series  Dear Subscriber,The major factor underlying the considerable initial costs of e-learning development is the time required of programmers, instructional des

Delivery Status Notification

2005-02-23 Thread Mail Delivery Service
- These recipients of your message have been processed by the mail server: [EMAIL PROTECTED]; Failed; 5.1.1 (bad destination mailbox address) Remote MTA 66.28.189.160: SMTP diagnostic: 551 <[EMAIL PROTECTED]> is a deactivated mailbox Reporting-MTA: dns; C9mailgw08.amadis.com Received-from-

Re: Code name "Killer Rabbit": New Sub Can Tap Undersea Cables

2005-02-23 Thread Tyler Durden
DWDM certainly makes it more complicated. Of course, that same technology allows them to send much more back. (Regarding the single OC-3 mentioned previously.) Well, DISTANCE makes it more complicated first of all. You need undersea repeaters and/or OFAs in order to get traffic from most parts o

Re: I'll show you mine if you show me, er, mine

2005-02-23 Thread Peter Gutmann
"R.A. Hettinga" <[EMAIL PROTECTED]> forwarded: >Briefly, it works like this: point A transmits an encrypted message to point >B. Point B can decrypt this, if it knows the password. The decrypted text is >then sent back to point A, which can verify the decryption, and confirm that >point B really d

As Gonzo in Life as in His Work

2005-02-23 Thread R.A. Hettinga
OpinionJournal - LEISURE & ARTS As Gonzo in Life as in His Work Hunter S. Thompson died as he lived. BY TOM WOLFE Tuesday, February 22, 2005 12:01 a.m. Hunter S. Thompson was one of those rare writers who come as advertised. The

I'll show you mine if you show me, er, mine

2005-02-23 Thread R.A. Hettinga
The Register Biting the hand that feeds IT The Register » Security » Identity » Original URL: http://www.theregister.co.uk/2005/02/21/crypto_wireless/ I'll show you mine if you show me, er, mine By Lucy Sherriff (lucy.sher

Re: On the road to truth and madness

2005-02-23 Thread Peter Gutmann
>We were somewhere around Barstow on the edge of the desert when the drugs >began to take hold. The following was my variant on this from a few years ago, representing the 56th IETF PKIX meeting minutes. Note that this is from the book form, not the film version of the text: -- Snip -- We were