http://www.theregister.co.uk/2005/02/16/rsa_consumer_survey/print.html
The Register
Biting the hand that feeds IT
The Register » Security » Network Security »
Original URL: http://www.theregister.co.uk/2005/02/16/rsa_consumer_survey/
Passwords? We don't need no stinking passwords
By John
On Tue, 15 Feb 2005, Steven M. Bellovin wrote:
According to Bruce Schneier's blog
(http://www.schneier.com/blog/archives/2005/02/sha1_broken.html), a
team has found collisions in full SHA-1. It's probably not a practical
threat today, since it takes 2^69 operations to do it and we haven't
In message [EMAIL PROTECTED], Alexandre
Dulaunoy writes:
On Tue, 15 Feb 2005, Steven M. Bellovin wrote:
According to Bruce Schneier's blog
(http://www.schneier.com/blog/archives/2005/02/sha1_broken.html), a
team has found collisions in full SHA-1. It's probably not a practical
threat
From: [EMAIL PROTECTED] [mailto:owner-
[EMAIL PROTECTED] On Behalf Of Rich Salz
The other day I sent Amir Herzberg a private note saying I thought his
new tool was pretty neat, and though I'm sure he's heard it a lot,
thanks. He said nope, nobody else has said it, and I was stunned.
My
From: Steven M. Bellovin [EMAIL PROTECTED]
Sent: Feb 15, 2005 11:29 PM
To: cryptography@metzdowd.com
Subject: SHA-1 cracked
According to Bruce Schneier's blog
(http://www.schneier.com/blog/archives/2005/02/sha1_broken.html), a
team has found collisions in full SHA-1. It's probably not a
David Farber wrote:
-- Forwarded Message
From: Rodney Joffe [EMAIL PROTECTED]
Date: Wed, 16 Feb 2005 07:36:36 -0700
To: Dave Farber [EMAIL PROTECTED]
Subject: SHA-1 cracked?
For IP
Hi Dave,
Bruce Schneier is reporting in his blog that SHA-1 appears to have been
broken by a Chinese group, and
From: Josep Domingo [EMAIL PROTECTED]
Subject: CARDIS'2006 Call for Papers
To: Josep Domingo [EMAIL PROTECTED]
Date: Wed, 16 Feb 2005 18:29:37 +0100 (MET)
Apologies for cross-posting. Please disseminate to potential
contributors.
===
*** CFP CARDIS 2006 + CFP CARDIS
Code-named Killer Rabbit...
Cheers,
RAH
--
http://www.strategypage.com/search.asp?target=c:\inetpub\strategypageroot\fyeo\howtomakewar\docs\htsub.htmsearch=carter
StrategyPage.com
February 16, 2005
SUBMARINES: The American Mystery Sub
January 14, 2005: The USS Jimmy Carter (SSN 23), a
It is worth emphasizing that, as a 2^69 attack, we're not going to be
getting test vectors out of Wang. After all, if she had 2^69
computation available, she wouldn't have needed to attack MD5; she could
have just brute forced it in 2^64.
This means the various attacks in the MD5 Someday paper
Rich Salz [EMAIL PROTECTED] writes:
Why would mozilla embed this? If they came here, to the putative experts,
for an evaluation, they'd leave thinking Amir and company just invented
Rot-13. It's not that. It's also not perfect. BFD -- you got anything
better?
This ties in to one of my
On Feb 15, 2005, at 12:40, R.A. Hettinga wrote:
Instant, is a property-marking fluid that, when
brushed on items like office equipment or motorcycles, tags them with
millions of tiny fragments, each etched with a unique SIN (SmartWater
identification number) that is registered with the owner's
- Original Message -
From: Steven M. Bellovin [EMAIL PROTECTED]
Subject: SHA-1 cracked
It's probably not a practical
threat today, since it takes 2^69 operations to do it
I will argue that the threat is realizable today, and highly practical. It
is well documented that in 1998 RSA
Hi,
I'm working on a project that requires a benchmark against which to judge
various suppliers. The closest that has similar requirements is the ATM
industry. To this end I'm looking for any papers, specifications or published
attacks against ATM machines and their infrastructure. I'm also
Joseph Ashwood wrote:
I believe you are incorrect in this statement. It is a matter of public
record that RSA Security's DES Challenge II was broken in 72 hours by
$250,000 worth of semi-custom machine, for the sake of solidity let's
assume they used 2^55 work to break it. Now moving to a
Steven M. Bellovin wrote:
According to Bruce Schneier's blog
(http://www.schneier.com/blog/archives/2005/02/sha1_broken.html), a
team has found collisions in full SHA-1. It's probably not a practical
threat today, since it takes 2^69 operations to do it and we haven't
heard claims that NSA et
15 matches
Mail list logo