Re: [cryptography] To Protect and Infect Slides

2014-01-09 Thread ianG
On 9/01/14 00:38 AM, d...@geer.org wrote: Keying off of one phrase alone, This combat is about far more than crypto... I suggest you immediately familiarize yourself with last month's changes to the Wassenaar Agreement, perhaps starting here:

Re: [cryptography] Techniques for protecting CA Root certificate Secret Key

2014-01-09 Thread Peter Bowen
On Wed, Jan 8, 2014 at 11:54 PM, ianG i...@iang.org wrote: On 9/01/14 02:49 AM, Paul F Fraser wrote: Software and physical safe keeping of Root CA secret key are central to security of a large set of issued certificates. Are there any safe techniques for handling this problem taking into

Re: [cryptography] Techniques for protecting CA Root certificate Secret Key

2014-01-09 Thread ianG
On 9/01/14 18:05 PM, Peter Bowen wrote: On Wed, Jan 8, 2014 at 11:54 PM, ianG i...@iang.org wrote: On 9/01/14 02:49 AM, Paul F Fraser wrote: Software and physical safe keeping of Root CA secret key are central to security of a large set of issued certificates. Are there any safe techniques

[cryptography] Speaking of key management [was Re: Techniques for protecting CA Root certificate Secret]

2014-01-09 Thread Joe St Sauver
Hi, Those who are interested in key management may wish to note: Cryptographic Key Management Workshop 2014 http://www.nist.gov/itl/csd/ct/ckm_workshop2014.cfm March 4-5, 2014, NIST, Gaithersburg MD See also: SP 800-152 DRAFT A Profile for U. S. Federal Cryptographic Key

Re: [cryptography] Techniques for protecting CA Root certificate Secret Key

2014-01-09 Thread Thierry Moreau
Peter Bowen wrote: On Wed, Jan 8, 2014 at 11:54 PM, ianG i...@iang.org wrote: On 9/01/14 02:49 AM, Paul F Fraser wrote: Software and physical safe keeping of Root CA secret key are central to security of a large set of issued certificates. Are there any safe techniques for handling this

Re: [cryptography] Speaking of key management [was Re: Techniques for protecting CA Root certificate Secret]

2014-01-09 Thread Thierry Moreau
Joe St Sauver wrote: Hi, Those who are interested in key management may wish to note: Cryptographic Key Management Workshop 2014 http://www.nist.gov/itl/csd/ct/ckm_workshop2014.cfm March 4-5, 2014, NIST, Gaithersburg MD See also: SP 800-152 DRAFT A Profile for U. S. Federal

Re: [cryptography] Techniques for protecting CA Root certificate Secret Key

2014-01-09 Thread Tony Arcieri
On Thu, Jan 9, 2014 at 7:51 AM, Thierry Moreau thierry.mor...@connotech.com wrote: I would suggest that the DNSSEC deployment at the root would be a good case study for IT security management, from an historic perspective. The primary source documents, and the conclusion of such case study,

Re: [cryptography] Techniques for protecting CA Root certificate Secret Key

2014-01-09 Thread staticsafe
On Thu, Jan 09, 2014 at 10:36:23AM -0800, Tony Arcieri wrote: I'd actually look at DNSSEC as something of an antipattern. They ostensibly seem to be using One Key To Rule Them all and a Shamir-like secret sharing scheme. This makes less sense to me than a multisignature trust system /

Re: [cryptography] Techniques for protecting CA Root certificate Secret Key

2014-01-09 Thread Thierry Moreau
Tony Arcieri wrote: On Thu, Jan 9, 2014 at 7:51 AM, Thierry Moreau thierry.mor...@connotech.com mailto:thierry.mor...@connotech.com wrote: I would suggest that the DNSSEC deployment at the root would be a good case study for IT security management, from an historic perspective. The

Re: [cryptography] Speaking of key management [was Re: Techniques for protecting CA Root certificate Secret]

2014-01-09 Thread dj
Hi, Those who are interested in key management may wish to note: Cryptographic Key Management Workshop 2014 http://www.nist.gov/itl/csd/ct/ckm_workshop2014.cfm March 4-5, 2014, NIST, Gaithersburg MD See also: SP 800-152 DRAFT A Profile for U. S. Federal Cryptographic Key

Re: [cryptography] Techniques for protecting CA Root certificate Secret Key

2014-01-09 Thread Tony Arcieri
On Thu, Jan 9, 2014 at 11:08 AM, Thierry Moreau thierry.mor...@connotech.com wrote: I guess a multisignature trust system requires some algorithm support beyond RSA and ECC signature schemes pushed by NIST, and thus would have been rejected on the (questionable) basis of lack of support in

Re: [cryptography] Speaking of key management [was Re: Techniques for protecting CA Root certificate Secret]

2014-01-09 Thread dj
SP 800-152 Don't forget to look at SP 800-130 in parallel. Overall, an endless list of requirements that may be useful as a barrier to entry in the US Federal Government IT security market. That's why I'm going. To try and trim the obstructive requirements. If we're building on-chip key

Re: [cryptography] Techniques for protecting CA Root certificate Secret Key

2014-01-09 Thread timow+cryptography
On 2014-01-09, Paul F Fraser wrote: Software and physical safe keeping of Root CA secret key are central to security of a large set of issued certificates. Are there any safe techniques for handling this problem taking into account the need to not have the control in the hands of one person?

Re: [cryptography] The next gen P2P secure email solution

2014-01-09 Thread grarpamp
On Tue, Dec 24, 2013 at 5:09 AM, danimoth danim...@cryptolab.net wrote: On 24/12/13 at 04:20am, grarpamp wrote: This thread pertains specifically to the use of P2P/DHT models to replace traditional email as we know it today. There was a former similarly named thread on this that diverged...

Re: [cryptography] [Cryptography] Cuckoo Cycles: a new memory-hard proof-of-work system

2014-01-09 Thread Zooko O'Whielacronx
Hello John Tromp! That is neat! The paper could use a related work section, for example Litecoin uses scrypt in the attempt to make it harder to implement in ASIC: https://litecoin.info/Scrypt The current Password Hashing Contest (disclosure: I am on the panel) may be relevant to your