Jack Lloyd [EMAIL PROTECTED] wrote:
Making a cipher that uses an N bit key but is only secure to 2^M
operations with MN is, firstly, considered broken in many circles, as
well as being inefficient (why generate/transmit/store 512 bit keys
when it only provides the security of a ~300 bit
Allen wrote:
Add Moore's Law, a bigger budget and a more efficient machine, how long
before AES-128 can be decoded in less than a day?
It does make one ponder.
Wander over to http://keylength.com/ and poke at their
models. They have 6 or so to choose from, and they have it
coded up in
Arshad Noor [EMAIL PROTECTED] writes:
This may be the first phishing e-mail I've seen that uses
a message related to digital certificates for attacking the
client; I am not a customer of Comerica.
Has anyone else seen this before?
These have been around for awhile, I'm not on my home machine at
http://www.nsa.gov/public/crypt_spectrum.cfm
--Steve Bellovin, http://www.cs.columbia.edu/~smb
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
| Date: Thu, 24 Apr 2008 16:22:34 +
| From: Steven M. Bellovin [EMAIL PROTECTED]
| To: cryptography@metzdowd.com
| Subject: Declassified NSA publications
|
| http://www.nsa.gov/public/crypt_spectrum.cfm
Interesting stuff. There's actually more there in some parallel
directories - there's an
A pretty scary paper from the Usenix LEET conference:
http://www.usenix.org/event/leet08/tech/full_papers/king/king_html/
The paper describes how, by adding a very small number of gates to a
microprocessor design (small enough that it would be hard to notice
them), you can create a machine that
Perry E. Metzger wrote:
A pretty scary paper from the Usenix LEET conference:
http://www.usenix.org/event/leet08/tech/full_papers/king/king_html/
The paper describes how, by adding a very small number of gates to a
microprocessor design (small enough that it would be hard to notice
them),