Allen [EMAIL PROTECTED] writes:
I just got a warning that a certificate had expired and yet the data in it
says:
[From: Tue Aug 05 17:00:00 PDT 2003,
To: Mon Aug 05 16:59:59 PDT 2013]
The error message says: The digital signature was generated with a trusted
certificate but has expired.
Peter Gutmann wrote:
Allen [EMAIL PROTECTED] writes:
I just got a warning that a certificate had expired and yet the data in it
says:
[From: Tue Aug 05 17:00:00 PDT 2003,
To: Mon Aug 05 16:59:59 PDT 2013]
The error message says: The digital signature was generated with a trusted
Peter,
Which card reader(s) did you use?
Adam and I used the Omnikey Cardman 5321
Did the Golden Reader Tool (GRT) recognize the Cardman reader w/o
any modifications? The most current version I have (GRT v2.9)
says in the ePassport Reader List:
- Integrated Engineering Smart-ID
- NMDA
On Mon, Aug 18, 2008 at 10:16:02AM -0700, Paul Hoffman wrote:
[...]
Essentially no one would argue that is is quite expensive. I
suspect that nearly everyone in the country would be happy to pay an
additional $1/election for more reliable results.
Without seeing all of the expense (and
http://blog.wired.com/27bstroke6/2008/08/federal-judge-t.html
--
Perry E. Metzger[EMAIL PROTECTED]
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
At 03:33 PM 8/19/2008 -0400, Perry E. Metzger wrote:
http://blog.wired.com/27bstroke6/2008/08/federal-judge-t.html
MBTA's claim was based on CFAA, the Computer Fraud and Abuse
Act. Properly, the judge decided (in effect) that CFAA only applies
to messing with computers (a legal term of
Perry E. Metzger wrote:
http://www.eff.org/press/archives/2008/08/19
You wonder if it was MTBA exhibit 4 that tipped their case against the
MTBA's injunction, using Roblimo's article on Sklyarov, quoting reactions to
Dmitry Sklyarov's arrest for a DMCA violation on July 16, 2001, wherein:
According to Bruce Schneier...
http://www.schneier.com/blog/archives/2008/08/adi_shamirs_cub.html
...Adi Shamir described a new generalized cryptanalytic attack at
Crypto today.
Anyone have details to share?
Perry
-
The
Perry E. Metzger wrote:
According to Bruce Schneier...
http://www.schneier.com/blog/archives/2008/08/adi_shamirs_cub.html
...Adi Shamir described a new generalized cryptanalytic attack at
Crypto today.
Anyone have details to share?
Stunningly smart, and an excellent and understandable
Greg Rose [EMAIL PROTECTED] writes:
His example was an insanely complicated theoretical LFSR-based stream
cipher; recovers keys with 2^28 (from memory, I might be a little
out), with 2^40 precomputation, from only about a million output
bits. They are working on applying the technique to real
Perry E. Metzger wrote:
Greg Rose [EMAIL PROTECTED] writes:
His example was an insanely complicated theoretical LFSR-based stream
cipher; recovers keys with 2^28 (from memory, I might be a little
out), with 2^40 precomputation, from only about a million output
bits. They are working on applying
Greg, assorted folks noted, way back when, that Skipjack looked a lot
like a stream cipher. Might it be vulnerable?
--Steve Bellovin, http://www.cs.columbia.edu/~smb
-
The Cryptography Mailing List
Unsubscribe
12 matches
Mail list logo