On Thu, Nov 17, 2005 at 12:10:53PM -0500, John Kelsey wrote:
c. Maybe they just got it wrong. SHA0 and SHA1 demonstrate that this
is all too possible. (It's quite plausible to me that they have very
good tools for analyzing block ciphers, but that they aren't or
weren't sure how to best
actually justified for cryptosystems: It turned out, on the key escrow side
of the protocol design, NSA actually fell over the edge, and there was a
simple attack (Matt Blaze's work, as I recall).
Details on the so-called LEAF blower here:
http://www.crypto.com/papers/eesproto.pdf
--
From: [EMAIL PROTECTED]
Sent: Nov 16, 2005 12:26 PM
Subject: Re: the effects of a spy
...
Remember Clipper? It had an NSA-designed 80-bit encryption
algorithm. One interesting fact about it was that it appeared to be
very aggressively designed. Most published algorithms will, for
example
Perry E. Metzger wrote:
Steven M. Bellovin [EMAIL PROTECTED] writes:
Bruce Schneier's newsletter Cryptogram has the following fascinating
link: http://www.fas.org/irp/eprint/heath.pdf
It's the story of effects of a single spy who betrayed keys and
encryptor designs.
[...]
One intriguing
On Tue, Nov 15, 2005 at 06:31:30PM -0500, Perry E. Metzger wrote:
Steven M. Bellovin [EMAIL PROTECTED] writes:
Bruce Schneier's newsletter Cryptogram has the following fascinating
link: http://www.fas.org/irp/eprint/heath.pdf
It's the story of effects of a single spy who betrayed keys
On Tue, 15 Nov 2005, Perry E. Metzger wrote:
| Does the tension between securing one's own communications and
| breaking an opponents communications sometimes drive the use of COMSEC
| gear that may be too close to the edge for comfort, for fear of
| revealing too much about more secure methods?
Bruce Schneier's newsletter Cryptogram has the following fascinating
link: http://www.fas.org/irp/eprint/heath.pdf
It's the story of effects of a single spy who betrayed keys and
encryptor designs.
--Steven M. Bellovin, http://www.cs.columbia.edu/~smb
Steven M. Bellovin [EMAIL PROTECTED] writes:
Bruce Schneier's newsletter Cryptogram has the following fascinating
link: http://www.fas.org/irp/eprint/heath.pdf
It's the story of effects of a single spy who betrayed keys and
encryptor designs.
Very interesting indeed. I was unaware