Passwords? We don't need no stinking passwords

2005-02-17 Thread R.A. Hettinga
http://www.theregister.co.uk/2005/02/16/rsa_consumer_survey/print.html The Register Biting the hand that feeds IT The Register » Security » Network Security » Original URL: http://www.theregister.co.uk/2005/02/16/rsa_consumer_survey/ Passwords? We don't need no stinking passwords By John

Re: SHA-1 cracked

2005-02-17 Thread Alexandre Dulaunoy
On Tue, 15 Feb 2005, Steven M. Bellovin wrote: According to Bruce Schneier's blog (http://www.schneier.com/blog/archives/2005/02/sha1_broken.html), a team has found collisions in full SHA-1. It's probably not a practical threat today, since it takes 2^69 operations to do it and we haven't

Re: SHA-1 cracked

2005-02-17 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Alexandre Dulaunoy writes: On Tue, 15 Feb 2005, Steven M. Bellovin wrote: According to Bruce Schneier's blog (http://www.schneier.com/blog/archives/2005/02/sha1_broken.html), a team has found collisions in full SHA-1. It's probably not a practical threat

RE: That's gratitude for ya...

2005-02-17 Thread Marcel Popescu
From: [EMAIL PROTECTED] [mailto:owner- [EMAIL PROTECTED] On Behalf Of Rich Salz The other day I sent Amir Herzberg a private note saying I thought his new tool was pretty neat, and though I'm sure he's heard it a lot, thanks. He said nope, nobody else has said it, and I was stunned. My

Re: SHA-1 cracked

2005-02-17 Thread John Kelsey
From: Steven M. Bellovin [EMAIL PROTECTED] Sent: Feb 15, 2005 11:29 PM To: cryptography@metzdowd.com Subject: SHA-1 cracked According to Bruce Schneier's blog (http://www.schneier.com/blog/archives/2005/02/sha1_broken.html), a team has found collisions in full SHA-1. It's probably not a

Re: [IP] SHA-1 cracked?

2005-02-17 Thread Ben Laurie
David Farber wrote: -- Forwarded Message From: Rodney Joffe [EMAIL PROTECTED] Date: Wed, 16 Feb 2005 07:36:36 -0700 To: Dave Farber [EMAIL PROTECTED] Subject: SHA-1 cracked? For IP Hi Dave, Bruce Schneier is reporting in his blog that SHA-1 appears to have been broken by a Chinese group, and

[EMAIL PROTECTED]: CARDIS'2006 Call for Papers]

2005-02-17 Thread R. Hirschfeld
From: Josep Domingo [EMAIL PROTECTED] Subject: CARDIS'2006 Call for Papers To: Josep Domingo [EMAIL PROTECTED] Date: Wed, 16 Feb 2005 18:29:37 +0100 (MET) Apologies for cross-posting. Please disseminate to potential contributors. === *** CFP CARDIS 2006 + CFP CARDIS

'SS Jimma: The American Mystery Sub

2005-02-17 Thread R.A. Hettinga
Code-named Killer Rabbit... Cheers, RAH -- http://www.strategypage.com/search.asp?target=c:\inetpub\strategypageroot\fyeo\howtomakewar\docs\htsub.htmsearch=carter StrategyPage.com February 16, 2005 SUBMARINES: The American Mystery Sub January 14, 2005: The USS Jimmy Carter (SSN 23), a

Re: SHA-1 cracked

2005-02-17 Thread Dan Kaminsky
It is worth emphasizing that, as a 2^69 attack, we're not going to be getting test vectors out of Wang. After all, if she had 2^69 computation available, she wouldn't have needed to attack MD5; she could have just brute forced it in 2^64. This means the various attacks in the MD5 Someday paper

Re: That's gratitude for ya...

2005-02-17 Thread Peter Gutmann
Rich Salz [EMAIL PROTECTED] writes: Why would mozilla embed this? If they came here, to the putative experts, for an evaluation, they'd leave thinking Amir and company just invented Rot-13. It's not that. It's also not perfect. BFD -- you got anything better? This ties in to one of my

Re: Digital Water Marks Thieves

2005-02-17 Thread Matt Crawford
On Feb 15, 2005, at 12:40, R.A. Hettinga wrote: Instant, is a property-marking fluid that, when brushed on items like office equipment or motorcycles, tags them with millions of tiny fragments, each etched with a unique SIN (SmartWater identification number) that is registered with the owner's

Re: SHA-1 cracked

2005-02-17 Thread Joseph Ashwood
- Original Message - From: Steven M. Bellovin [EMAIL PROTECTED] Subject: SHA-1 cracked It's probably not a practical threat today, since it takes 2^69 operations to do it I will argue that the threat is realizable today, and highly practical. It is well documented that in 1998 RSA

ATM machine security

2005-02-17 Thread Lee Parkes
Hi, I'm working on a project that requires a benchmark against which to judge various suppliers. The closest that has similar requirements is the ATM industry. To this end I'm looking for any papers, specifications or published attacks against ATM machines and their infrastructure. I'm also

Re: SHA1 broken?

2005-02-17 Thread Dave Howe
Joseph Ashwood wrote: I believe you are incorrect in this statement. It is a matter of public record that RSA Security's DES Challenge II was broken in 72 hours by $250,000 worth of semi-custom machine, for the sake of solidity let's assume they used 2^55 work to break it. Now moving to a

Re: SHA-1 cracked

2005-02-17 Thread Ian G
Steven M. Bellovin wrote: According to Bruce Schneier's blog (http://www.schneier.com/blog/archives/2005/02/sha1_broken.html), a team has found collisions in full SHA-1. It's probably not a practical threat today, since it takes 2^69 operations to do it and we haven't heard claims that NSA et