Bill Frantz writes:
What would be really nice is to be able to have the same PIN/password for
everything.
Do you really mean that? Sure, if I only have to remember one thing
it is easier for me. It is also a complete nightmare if it is ever
compromised.
--
note however, with regard to the 80 hardware tokens, or 3 hardware tokens,
or 1 hardware token scenario a single or small number of hardware
tokens (with each hardware token having an associated public key registered
multiple places) then can become a personal choice.
The current scenario
http://www.theatlantic.com/issues/2002/02/budiansky.htm
The Atlantic Monthly | February 2002
Notes Dispatches
Intelligence
Losing the Code War
The great age of code breaking is over-and with it much of our ability to
track the communications of our enemies
by Stephen Budiansky
.
http://online.wsj.com/article_print/0,4287,ON_CO_20020130_000329,00.html
January 30, 2002
NCipher Forms Alliance With F5 Networks
DOW JONES NEWSWIRES
LONDON -- NCipher, a provider of cryptographic IT security solutions, said
it has formed a strategic alliance with F5 Networks, the
Please note
The discount registration rate is only available until the
1st of February 2002. After this date registration will be
changed at the full rate.
*
Financial Cryptography 2002
March 11-14, 2002
Southhampton, Bermuda
Call for Participation
Financial
At 5:13 AM -0800 1/30/02, [EMAIL PROTECTED] wrote:
Bill Frantz writes:
What would be really nice is to be able to have the same PIN/password for
everything.
Do you really mean that? Sure, if I only have to remember one thing
it is easier for me. It is also a complete nightmare if it is
Hi all,
As you may
already know, I'm working on a text-book, to be published by Prentice Hall,
titled: Introduction to Secure Communication and Commerce Using Cryptography.
Lectures
covering much of the material, and a fair number of draft chapters, are now available
online; see
--
On 27 Jan 2002, at 21:17, Eugene Leitl wrote:
I think the only patents of particular note for ECC are
Certicom and H.P.'s ones on point-compression.
The original paper on ECC proposed point compression and
described the algorithm in 1985.
See Bernstein's web page
Thanks to Kurt Foss we offer two additional dismissal motions by
Elcom/Elcomsoft and Dmitry Sklyarov:
Notice of Motion and Motion to Dismiss Indictment for Lack of Jurisdiction
Notice of Motion and Motion to Dismiss Count One: Conspiracy
http://cryptome.org/usa-v-esds-nmd.htm
http://online.wsj.com/article_print/0,4287,SB1012341813532435520,00.html
January 30, 2002
THE MIDDLE SEAT
By SCOTT MCCARTNEY
A 'Trusted Traveler' Pass May Be
In the Cards for Frequent Fliers
ABOUT SCOTT MCCARTNEY
Some day in the future, maybe a year from now, you may have a trusted
The article below may be of interest to members of this list.
Bill
-Original Message-
From: AIP listserver [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, January 30, 2002 09:04
To: [EMAIL PROTECTED]
Subject: update.575
PHYSICS NEWS UPDATE
The American Institute
Some day in the future, maybe a year from now, you may have a trusted
traveler card. Congress wants it, the airlines need it and security
experts endorse it.
The benefits appear clear. With a tool to separate the wheat from the
So does an attack. Befriend someone with such a card, give
her a
At 7:38 AM -0800 1/29/02, Eric Rescorla wrote:
Ben Laurie [EMAIL PROTECTED] writes:
Eric Rescorla wrote:
BTW, I don't see why using a passphrase to a key makes you vulnerable to
a dictionary attack (like, you really are going to have a dictionary of
all possible 1024 bit keys crossed with
On Tuesday 29 January 2002 06:50 pm, Jei wrote:
-- Forwarded message --
Date: Mon, 28 Jan 2002 10:29:43 -0500
From: Matt Blaze [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: [open-source] File encryption
Just to echo Whit's two file encryption virtues (the laptop and
What are people's thoughts on CFS vs. loopback encryption? I've used CFS
in the past and found it quite useful, though as Matt said - a little
long in the tooth. Never really looked into loopback encryption (which
I'm aware is not something present across the majority of Unixes).
Nick
--
But there was an utterly trivial fix that DES users could employ if
they were worried
about security: they could simply encrypt each message twice, turning
56-bit DES into 112-bit DES, and squaring the number of key sequences
that
a code breaker would have to try. Messages could even be
16 matches
Mail list logo