On 9/01/14 00:38 AM, d...@geer.org wrote:
Keying off of one phrase alone,
This combat is about far more than crypto...
I suggest you immediately familiarize yourself with last month's
changes to the Wassenaar Agreement, perhaps starting here:
On Wed, Jan 8, 2014 at 11:54 PM, ianG i...@iang.org wrote:
On 9/01/14 02:49 AM, Paul F Fraser wrote:
Software and physical safe keeping of Root CA secret key are central to
security of a large set of issued certificates.
Are there any safe techniques for handling this problem taking into
On 9/01/14 18:05 PM, Peter Bowen wrote:
On Wed, Jan 8, 2014 at 11:54 PM, ianG i...@iang.org wrote:
On 9/01/14 02:49 AM, Paul F Fraser wrote:
Software and physical safe keeping of Root CA secret key are central to
security of a large set of issued certificates.
Are there any safe techniques
Hi,
Those who are interested in key management may wish to note:
Cryptographic Key Management Workshop 2014
http://www.nist.gov/itl/csd/ct/ckm_workshop2014.cfm
March 4-5, 2014, NIST, Gaithersburg MD
See also:
SP 800-152
DRAFT A Profile for U. S. Federal Cryptographic Key
Peter Bowen wrote:
On Wed, Jan 8, 2014 at 11:54 PM, ianG i...@iang.org wrote:
On 9/01/14 02:49 AM, Paul F Fraser wrote:
Software and physical safe keeping of Root CA secret key are central to
security of a large set of issued certificates.
Are there any safe techniques for handling this
Joe St Sauver wrote:
Hi,
Those who are interested in key management may wish to note:
Cryptographic Key Management Workshop 2014
http://www.nist.gov/itl/csd/ct/ckm_workshop2014.cfm
March 4-5, 2014, NIST, Gaithersburg MD
See also:
SP 800-152
DRAFT A Profile for U. S. Federal
On Thu, Jan 9, 2014 at 7:51 AM, Thierry Moreau thierry.mor...@connotech.com
wrote:
I would suggest that the DNSSEC deployment at the root would be a good
case study for IT security management, from an historic perspective. The
primary source documents, and the conclusion of such case study,
On Thu, Jan 09, 2014 at 10:36:23AM -0800, Tony Arcieri wrote:
I'd actually look at DNSSEC as something of an antipattern. They ostensibly
seem to be using One Key To Rule Them all and a Shamir-like secret sharing
scheme.
This makes less sense to me than a multisignature trust system /
Tony Arcieri wrote:
On Thu, Jan 9, 2014 at 7:51 AM, Thierry Moreau
thierry.mor...@connotech.com mailto:thierry.mor...@connotech.com wrote:
I would suggest that the DNSSEC deployment at the root would be a
good case study for IT security management, from an historic
perspective. The
Hi,
Those who are interested in key management may wish to note:
Cryptographic Key Management Workshop 2014
http://www.nist.gov/itl/csd/ct/ckm_workshop2014.cfm
March 4-5, 2014, NIST, Gaithersburg MD
See also:
SP 800-152
DRAFT A Profile for U. S. Federal Cryptographic Key
On Thu, Jan 9, 2014 at 11:08 AM, Thierry Moreau
thierry.mor...@connotech.com wrote:
I guess a multisignature trust system requires some algorithm support
beyond RSA and ECC signature schemes pushed by NIST, and thus would have
been rejected on the (questionable) basis of lack of support in
SP 800-152
Don't forget to look at SP 800-130 in parallel.
Overall, an endless list of requirements that may be useful as a barrier
to entry in the US Federal Government IT security market.
That's why I'm going. To try and trim the obstructive requirements. If
we're building on-chip key
On 2014-01-09, Paul F Fraser wrote:
Software and physical safe keeping of Root CA secret key are central
to security of a large set of issued certificates.
Are there any safe techniques for handling this problem taking into
account the need to not have the control in the hands of one person?
On Tue, Dec 24, 2013 at 5:09 AM, danimoth danim...@cryptolab.net wrote:
On 24/12/13 at 04:20am, grarpamp wrote:
This thread pertains specifically to the use of P2P/DHT models
to replace traditional email as we know it today. There was
a former similarly named thread on this that diverged...
Hello John Tromp!
That is neat! The paper could use a related work section, for example
Litecoin uses scrypt in the attempt to make it harder to implement in
ASIC:
https://litecoin.info/Scrypt
The current Password Hashing Contest (disclosure: I am on the panel)
may be relevant to your
15 matches
Mail list logo