Re: Microsoft: Palladium will not limit what you can run

2003-03-14 Thread Eugen Leitl
Unfortunately no one can accept in good faith a single word coming out of Redmond. Biddle has been denying Pd can be used for DRM in presentation (xref Lucky Green subsequent patent claims to call the bluff), however in recent (of this week) Focus interview Gates explicitly stated it does. This

Re: Microsoft: Palladium will not limit what you can run

2003-03-14 Thread Jeroen C. van Gelderen
On Thursday, Mar 13, 2003, at 21:45 US/Eastern, Jay Sulzberger wrote: On Thu, 13 Mar 2003, Hermes Remailer wrote: The following comes from Microsoft's recent mailing of their awkwardly named Windows Trusted Platform Technologies Information Newsletter March 2003. Since they've abandoned the

Re: Diffie-Hellman 128 bit

2003-03-14 Thread Bill Stewart
At 01:48 PM 03/13/2003 -0800, NOP wrote: I am looking at attacks on Diffie-Hellman. The protocol implementation I'm looking at designed their diffie-hellman using 128 bit primes (generated each time, yet P-1/2 will be a prime, so no go on pohlig-hellman attack), so what attacks are there that I

Re: Microsoft: Palladium will not limit what you can run

2003-03-14 Thread Anish
Hi all, I would be really glad to know more on Pallidium .I have tried to get some info but havent been able to get much. I would be really thankful if some one could give me some pointers.This is inspite of having sat through two lectures one from Graeme Proudler(H.P. Research Labs),and

Face-Recognition Technology Improves

2003-03-14 Thread R. A. Hettinga
http://www.nytimes.com/2003/03/14/technology/14FACE.html?th=pagewanted=printposition=top The New York Times March 14, 2003 Face-Recognition Technology Improves By BARNABY J. FEDER Facial recognition technology has improved substantially since 2000, according to results released yesterday

Re: Diffie-Hellman 128 bit

2003-03-14 Thread Anton Stiglic
- Original Message - From: NOP [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, March 13, 2003 4:48 PM Subject: Diffie-Hellman 128 bit I am looking at attacks on Diffie-Hellman. The protocol implementation I'm looking at designed their diffie-hellman using 128 bit primes

In-line Internet/crypto device

2003-03-14 Thread Steve Schear
Apologies if this is rather old news. http://www.lantronix.com/products/eds/xport/index.html steve - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Diffie-Hellman 128 bit

2003-03-14 Thread NOP
Nope, it uses 128 bit primes. I'm trying to compute the discrete logarithm and they are staying within a 128 bit GF(p) field. Sickening. Thnx. Lance - Original Message - From: Anton Stiglic [EMAIL PROTECTED] To: NOP [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Friday, March 14, 2003 8:10

Re: Diffie-Hellman 128 bit

2003-03-14 Thread Derek Atkins
Hi, I'm sorry to inform you, but a brute-force attack on a 128-bit prime is simple to mount. I don't think I can estimate the length of time to attack a prime of this length, but it wouldn't be very long. Consider that 425 bits is only about 4KMY (Kilo-MIP-Years) -- with todays 2KM+ processors

Re: Microsoft: Palladium will not limit what you can run

2003-03-14 Thread David Wagner
Hermes Remailer wrote: Hopefully this will shed light on the frequent claims that Palladium will limit what programs people can run, [...] That's a strawman argument. The problem is not that Palladium will *itself* directly limit what I can run; the problem is what Palladium enables. Why are

Re: Encryption of data in smart cards

2003-03-14 Thread bear
On Wed, 12 Mar 2003, Krister Walfridsson wrote: On Tue, 11 Mar 2003, Werner Koch wrote: If you want to encrypt the data on the card, you also need to store the key on it. And well, if you are able to read out the data, you are also able to read out the key (more or less trivial for most

Recent IOTP and ECML publiccations

2003-03-14 Thread R. A. Hettinga
--- begin forwarded text Status: RO Date: Fri, 14 Mar 2003 13:56:25 -0700 From: [EMAIL PROTECTED] Subject: Recent IOTP and ECML publiccations To: [EMAIL PROTECTED], [EMAIL PROTECTED] 3506 I Requirements and Design for Voucher Trading System (VTS), Eastlake D., Fujimura K., 2003 (15pp)

Re: Encryption of data in smart cards

2003-03-14 Thread Nikita Borisov
Trei, Peter wrote: John Kelsey[SMTP:[EMAIL PROTECTED] At 11:08 PM 3/12/03 +0100, Krister Walfridsson wrote: This is not completely true -- I have seen some high-end cards that use the PIN code entered by the user as the encryption key. And it is quite easy to do similar things on Java cards...

Re: Diffie-Hellman 128 bit

2003-03-14 Thread NOP
Well, I'm attacking a protocol, I know the rules of DH parameters, and the issue here is I'm trying to solve x, brute forcing that in the 128 bit range can be difficult, and x doesn't have to be a prime. (a = g^x mod P). Their primes are 128 bit primes, as well as their pubkeys, I've done some

Re: Face-Recognition Technology Improves

2003-03-14 Thread Sidney Markowitz
In addition, only one subject in 100 is falsely linked to an image in the data base in the top systems. Wow, 99% accuracy for false positives! That means only a little more than 75 people a year mistakenly detained for questioning in Atlanta HartsField Airport (ATL), and even fewer at the

Brumley Boneh timing attack on OpenSSL

2003-03-14 Thread Bill Stewart
From Slashdot: http://slashdot.org/article.pl?sid=03/03/14/0012214mode=threadtid=172 David Brumley and Dan Boneh write: Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a