Unfortunately no one can accept in good faith a single word coming out of
Redmond. Biddle has been denying Pd can be used for DRM in presentation
(xref Lucky Green subsequent patent claims to call the bluff), however in
recent (of this week) Focus interview Gates explicitly stated it does.
This
On Thursday, Mar 13, 2003, at 21:45 US/Eastern, Jay Sulzberger wrote:
On Thu, 13 Mar 2003, Hermes Remailer wrote:
The following comes from Microsoft's recent mailing of their awkwardly
named Windows Trusted Platform Technologies Information Newsletter
March 2003. Since they've abandoned the
At 01:48 PM 03/13/2003 -0800, NOP wrote:
I am looking at attacks on Diffie-Hellman.
The protocol implementation I'm looking at designed their diffie-hellman
using 128 bit primes (generated each time, yet P-1/2 will be a prime, so no
go on pohlig-hellman attack), so what attacks are there that I
Hi all,
I would be really glad to know more on Pallidium .I have tried to get some info but
havent been able to get much.
I would be really thankful if some one could give me some pointers.This is inspite of
having sat through two lectures one from Graeme Proudler(H.P. Research Labs),and
http://www.nytimes.com/2003/03/14/technology/14FACE.html?th=pagewanted=printposition=top
The New York Times
March 14, 2003
Face-Recognition Technology Improves
By BARNABY J. FEDER
Facial recognition technology has improved substantially since 2000, according to
results released yesterday
- Original Message -
From: NOP [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, March 13, 2003 4:48 PM
Subject: Diffie-Hellman 128 bit
I am looking at attacks on Diffie-Hellman.
The protocol implementation I'm looking at designed their diffie-hellman
using 128 bit primes
Apologies if this is rather old news.
http://www.lantronix.com/products/eds/xport/index.html
steve
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Nope, it uses 128 bit primes. I'm trying to compute the discrete logarithm
and they are staying within a 128 bit GF(p) field. Sickening.
Thnx.
Lance
- Original Message -
From: Anton Stiglic [EMAIL PROTECTED]
To: NOP [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Friday, March 14, 2003 8:10
Hi,
I'm sorry to inform you, but a brute-force attack on a 128-bit prime
is simple to mount. I don't think I can estimate the length of time
to attack a prime of this length, but it wouldn't be very long.
Consider that 425 bits is only about 4KMY (Kilo-MIP-Years) -- with
todays 2KM+ processors
Hermes Remailer wrote:
Hopefully this will shed light on the frequent claims that Palladium will
limit what programs people can run, [...]
That's a strawman argument. The problem is not that Palladium will
*itself* directly limit what I can run; the problem is what Palladium
enables. Why are
On Wed, 12 Mar 2003, Krister Walfridsson wrote:
On Tue, 11 Mar 2003, Werner Koch wrote:
If you want to encrypt the
data on the card, you also need to store the key on it. And well, if
you are able to read out the data, you are also able to read out the
key (more or less trivial for most
--- begin forwarded text
Status: RO
Date: Fri, 14 Mar 2003 13:56:25 -0700
From: [EMAIL PROTECTED]
Subject: Recent IOTP and ECML publiccations
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
3506 I
Requirements and Design for Voucher Trading System (VTS), Eastlake D.,
Fujimura K., 2003 (15pp)
Trei, Peter wrote:
John Kelsey[SMTP:[EMAIL PROTECTED]
At 11:08 PM 3/12/03 +0100, Krister Walfridsson wrote:
This is not completely true -- I have seen some high-end cards that use
the PIN code entered by the user as the encryption key. And it is quite
easy to do similar things on Java cards...
Well, I'm attacking a protocol, I know the rules of DH parameters, and the
issue here is I'm trying to solve x, brute forcing that in the 128 bit range
can be difficult, and x doesn't have to be a prime. (a = g^x mod P). Their
primes are 128 bit primes, as well as their pubkeys, I've done some
In addition, only one subject in 100 is falsely linked
to an image in the data base in the top systems.
Wow, 99% accuracy for false positives! That means only a little more than
75 people a year mistakenly detained for questioning in Atlanta
HartsField Airport (ATL), and even fewer at the
From Slashdot:
http://slashdot.org/article.pl?sid=03/03/14/0012214mode=threadtid=172
David Brumley and Dan Boneh write:
Timing attacks are usually used to attack weak computing devices such as
smartcards.
We show that timing attacks apply to general software systems.
Specifically, we devise a
16 matches
Mail list logo