In message [EMAIL PROTECTED], Jim Thompson writes:
Here in my hands, I have an "Atom-Age" HW RNG device.
Sounds interesting -- do you have a URL or other contact info?
But -- and it's a big "but" -- what assurance mechanisms does their device provide?
The Intel folks say that being sure
Vin McLellan [EMAIL PROTECTED] noted:
Last I heard the FIREFLY family of protocols used in STU-III remain
classified.
A finicky fellow, Anonymous [EMAIL PROTECTED], stepped in to
briskly correct me:
The FIREFLY protocol is specified in RFC 1217.
Nope. Gotta watch
Rather than argue about April 1 "FireFly"
RFCs and the purported properties of
classified devices, here's a tidbit
of real info:
I asked Eric if the protocols will
be published, so that compatible
software implemenations can be
On the other hand, RFC 2523 is more relevant, Photuris being
the genus that Fireflies belong in...
At 10:32 PM 4/28/99 -0400, Vin McLellan wrote:
The reference to "Firefly" crypto in 1217 is informative, and --
given that the NSA's internal development of the FIREFLY protocols goes way
One has to wonder if this is the actions of a company that is trustworthy
enough to supply RNG's to the community. IMHO it is not and I sincerely
hope support for the PIII is *not* included in /dev/random and/or IPSEC. I
will not be adding any support code in my software.
[Personally, given how
At 09:05 AM 4/29/99 -0400, Trei, Peter wrote:
I asked Eric if the protocols will be published, so that compatible
software implementations can be created.
He said yes.
Great! BTW, this sounds rather like the Harmless Little Project,
which appears to be moribund. HLP
Starium is selling hardware. The protocol for their current generation
devices, of which I own one, has been public for years. I am not surprised
that Eric is continuing this tradition for their next generation boxes.
However, releasing protocol specifications is not synonymous with
releasing a
To: [EMAIL PROTECTED]
From: Dave Farber [EMAIL PROTECTED]
Subject: IP: "Intercepting the Internet"
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: [EMAIL PROTECTED]
Precedence: list
Reply-To: [EMAIL PROTECTED]
From: "Caspar Bowden" [EMAIL PROTECTED]
To: "Dave Farber
Symantec agreed that the program fit its definition of a type of malicious
program known as a Trojan horse, so it included the software in its
continually updated list of dangerous programs, which include viruses,
that cause warnings to pop up on its customers' computers.
In fact, this
I have found the Cryptix class library works fine for
3DES and other encryptions. It's a little slow.
Here are two java programs I wrote which illustrate
how 3DES works using the Cryptix class library.
The first program encrypts a string (in the program)
using a key (in the program), and
10 matches
Mail list logo