FC01 E-Voting Panel Description

2001-02-17 Thread R. A. Hettinga
--- begin forwarded text Resent-Date: Mon, 12 Feb 2001 15:03:52 -0400 Date: Mon, 12 Feb 2001 14:02:42 -0500 (EST) From: Paul Syverson [EMAIL PROTECTED] To: [EMAIL PROTECTED] CC: [EMAIL PROTECTED] Subject: FC01 E-Voting Panel Description Resent-From: [EMAIL PROTECTED] Resent-Sender: [EMAIL

Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-17 Thread Niels Provos
In message 962j9b$bd5$[EMAIL PROTECTED], David Wagner writes: * Use a VPN with strong end-to-end cryptographic authentication and encryption (e.g., IPSEC or equivalent) At CITI, we protect the traffic between base station and wavelan clients via IPsec. The setup is very simple and it works

DCSB: Steven Levy; How the Crypto Rebels Won

2001-02-17 Thread R. A. Hettinga
--- begin forwarded text Date: Wed, 14 Feb 2001 09:52:21 + To: [EMAIL PROTECTED], [EMAIL PROTECTED] From: "R. A. Hettinga" [EMAIL PROTECTED] Subject: DCSB: Steven Levy; How the Crypto Rebels Won Cc: Steven Levy [EMAIL PROTECTED], Scott Moskowitz [EMAIL PROTECTED] Sender: [EMAIL PROTECTED]

Making One-time pad using the soundcard

2001-02-17 Thread Paul N
It is secure to make a onetime pad using 16 bit input from soundcard using the following algorithm? Each bit of the output is the result of XOR-ing all 16 bits from the input sample... so, for making one byte of "one-time pad", I need 8 samples (16*8 bits or 16 bytes) of input? Of course I

Re: Bad PRNGs revisted in FreSSH

2001-02-17 Thread Rodney Thayer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Gee, is Tatu going to yell at them too? (Refer to http://slashdot.org/articles/01/02/14/1120247.shtml if you don't know what I'm talking about.) One would think that after several years of IETF work on standardizing (that which is called SecSH

April RSA, Cypherpunks Meeting Schedule - Request for Comments?

2001-02-17 Thread Bill Stewart
The 2001 RSA Security Conference will be April 8-12 in San Francisco. http://www.rsasecurity.com/conference/ The Bay Area Cypherpunks monthly meeting is normally the second Saturday, except when there are major conferences in town. If you're visiting the area that week, are you likely to

stego fingerprints

2001-02-17 Thread William Knowles
Hello, I had this question asked by a subscriber of Infosec News http://www.c4i.org/isn.html After posting the near-FUD article on Bin Laden's use of stegography and I was unable to answer it, Could someone help me with this? Thanks in advance! William Knowles Moderator/ISN [EMAIL PROTECTED]

Re: Making One-time pad using the soundcard

2001-02-17 Thread David Honig
At 03:31 PM 2/14/01 +0200, Paul N wrote: It is secure to make a onetime pad using 16 bit input from soundcard using the following algorithm? Each bit of the output is the result of XOR-ing all 16 bits from the input sample... so, for making one byte of "one-time pad", I need 8 samples (16*8

Re: stego fingerprints

2001-02-17 Thread David Honig
At 12:49 PM 2/17/01 -0600, William Knowles wrote: Can you tell by statistical or other fiddling with a file whether it has stuff embedded in it? Not if the stats on the stegodata match the stats of the coverbits they replaced. 1. Measure at the stats on the least significant bits from your