On Tue, 5 Dec 2000, David Honig wrote:
Is there a reason not to use AES block cipher in a hashing mode
if you need a secure digest of some data?
Hashing modes of block ciphers require a re-key for every block, and hence
are really, really slow.
-Bram Cohen
At 03:43 PM 12/6/00 -0600, Rick Smith at Secure Computing wrote:
At 05:04 PM 12/5/00, Ray Dillinger wrote:
If someone wants to enter "sex" as a password, s/he deserves
what s/he gets (although you may put up an "insecure passphrase"
warning box for him/her).
The problem is that there's no
At 10:23 AM 12/8/00 -0800, Bram Cohen wrote:
On Tue, 5 Dec 2000, David Honig wrote:
Is there a reason not to use AES block cipher in a hashing mode
if you need a secure digest of some data?
Hashing modes of block ciphers require a re-key for every block, and hence
are really, really slow.
In message [EMAIL PROTECTED], "P
.J. Ponder" writes:
from: http://www.ibm.com/news/2000/11/30.phtml
IBM develops algorithm that encrypts and authenticates simultaneously
More precisely, this is a new mode of operation that does encryption
and authentication in one pass. It's also amenable
On Thu, 7 Dec 2000, P.J. Ponder wrote:
from: http://www.ibm.com/news/2000/11/30.phtml
IBM develops algorithm that encrypts and authenticates simultaneously
No word, of course, on how the thing actually works, or whether they
intend to patent it.
A note to the clueful about it being
I tried contacting Ascom about licensing IDEA. I've got no
response. Any licensees out there would be willing to
tell me who they're talking to?
At 10:10 PM 12/7/00 -0500, Arnold G. Reinhold wrote:
From http://www.defenselink.mil/news/Dec2000/b12062000_bt729-00.html
The Department of Defense, through its Defense Information Systems
Agency, last night awarded Iridium Satellite LLC of Arnold, Md., a
$72 million contract for 24 months of
Rick Smith at Secure Computing [EMAIL PROTECTED] writes:
Now, just how do we intend to address such concerns in our memory-based
authentication systems? Our whole technology for using memorized secrets is
built on the belief that people will remember and recite these secrets
perfectly.
- Original Message -
From: "Bill Stewart" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; "William Allen Simpson"
[EMAIL PROTECTED]
Sent: Friday, December 08, 2000 11:58 PM
Subject: Re: migration paradigm (was: Is PGP broken?)
A more important problem with
Bram Cohen [EMAIL PROTECTED] writes:
Is there a reason not to use AES block cipher in a hashing mode
if you need a secure digest of some data?
Hashing modes of block ciphers require a re-key for every block, and hence
are really, really slow.
Well, Rijndael can re-key faster than it can
On Fri, 08 Dec 2000, Bram Cohen wrote:
On Thu, 7 Dec 2000, P.J. Ponder wrote:
from: http://www.ibm.com/news/2000/11/30.phtml
IBM develops algorithm that encrypts and authenticates simultaneously
No word, of course, on how the thing actually works, or whether they
intend to patent
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
this is talking about parallizing processing of an individual message.
the application for this is packet processing in a protocol stack,
or "lower", packet processing in hardware below+/inside the protocol
stack.
you can't parallelize IPsec, for
At 3:35 PM -0600 12/7/2000, Rick Smith at Secure Computing wrote:
At 02:43 PM 12/7/00, Peter Fairbrother wrote:
In WW2 SOE and OSS used original poems which were often pornographic. See
"Between Silk and Cyanide" by Leo Marks for a harrowing account.
Yes, a terrific book. However, the book also
On 8 Dec 2000, at 20:41, Rodney Thayer wrote:
I tried contacting Ascom about licensing IDEA. I've got no
response. Any licensees out there would be willing to
tell me who they're talking to?
In 1998 I ordered one IDEA end user license (USD 15,--) by using a
web form under
On Sun, 10 Dec 2000, Paulo S. L. M. Barreto wrote:
A description of Jutla's mode of operation is available from NIST's AES site.
And yes, IBM has filed patent for it.
Note to cryptographers of the world - there are two reasons to patent an
algorithm -
1) to keep anyone else from patenting it
At 08:41 PM 12/8/00 -0800, Rodney Thayer wrote:
I tried contacting Ascom about licensing IDEA. I've got no
response. Any licensees out there would be willing to
tell me who they're talking to?
Got this from someone who got farther:
Tell him to call Fortress Technologies in Florida, they are
No word, of course, on how the thing actually works, or whether they
intend to patent it.
Not so. Search your nearest IETF internet-drafts repository for
draft-jutla-ietf-ipsec-esp-iapm-00.txt
And in there you will find
5. Intellectual Property Issues
IBM has
On Sun, 10 Dec 2000, Enzo Michelangeli wrote:
A more important problem with passphrase-based keys is collisions -
two people picking wimpy passwords can end up with the same keys.
Salt should take care of this (as well as reducing the effectiveness
of dictionary attacks).
There are times
Email advertising WORKS!
Email Advertise your product or website to millions for only $99.
For $99.00 you will receive the Stealth Mass Mailer Software,
List Manager, Over 10 million email addresses, and as a free bonus,
a Bulletproof mail server to send your mail through.
NEVER, lose your
19 matches
Mail list logo