Re: Comments/summary on unicity discussion

2003-03-09 Thread Joseph Ashwood
(the only sense in which this makes sense). Joseph Ashwood Trust Laboratories http://www.trustlaboratories.com - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Key Pair Agreement?

2003-01-21 Thread Joseph Ashwood
- Original Message - From: Jeroen C. van Gelderen [EMAIL PROTECTED] Here is a scenario: Scott wants Alice to generate a key pair after which he will receive Alice's public key. At the same time, Scott wants to make sure that this key pair is newly generated (has not been used before).

Re: Microsoft marries RSA Security to Windows

2002-10-10 Thread Joseph Ashwood
- Original Message - From: Roy M.Silvernail [EMAIL PROTECTED] And here, I thought that a portion of the security embodied in a SecurID token was the fact that it was a tamper-resistant, independent piece of hardware. Now M$ wants to put the PRNG out in plain view, along with its seed

Re: Re: Overcoming the potential downside of TCPA

2002-08-15 Thread Joseph Ashwood
- Original Message - From: Ben Laurie [EMAIL PROTECTED] The important part for this, is that TCPA has no key until it has an owner, and the owner can wipe the TCPA at any time. From what I can tell this was designed for resale of components, but is perfectly suitable as a point of

Re: TCPA not virtualizable during ownership change (Re: Overcoming the potential downside of TCPA)

2002-08-15 Thread Joseph Ashwood
This is going to be a very long, and very boring message. But it should highlight why we have differing opinions about so very many capabilities of the TCPA system. For the sake of attempting to avoid supplying too little information, I have simply searched for the term and will make comments on

Re: Overcoming the potential downside of TCPA

2002-08-14 Thread Joseph Ashwood
- Original Message - From: Ben Laurie [EMAIL PROTECTED] Joseph Ashwood wrote: There is nothing stopping a virtualized version being created. What prevents this from being useful is the lack of an appropriate certificate for the private key in the TPM. Actually that does nothing

Re: Seth on TCPA at Defcon/Usenix

2002-08-10 Thread Joseph Ashwood
- Original Message - From: AARG! Anonymous [EMAIL PROTECTED] [brief description of Document Revocation List] Seth's scheme doesn't rely on TCPA/Palladium. Actually it does, in order to make it valuable. Without a hardware assist, the attack works like this: Hack your software (which is

Re: deterministic primality test

2002-08-09 Thread Joseph Ashwood
[I've got some doubts about the content here but I think the discussion is certainly on charter --Perry] Since I have received a number of private replies all saying approximately the same thing; lookup for small n, use algo for large. Allow me to extend my observation. To quote myself from

Re: building a true RNG

2002-07-27 Thread Joseph Ashwood
- Original Message - From: John S. Denker [EMAIL PROTECTED] To: David Honig [EMAIL PROTECTED] Cc: [EMAIL PROTECTED]; 'Hannes R. Boehm' [EMAIL PROTECTED]; 'Ian Hill' [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Saturday, July 27, 2002 10:52 AM Subject: Re: building a true RNG I wrote:

Re: building a true RNG (was: Quantum Computing ...)

2002-07-24 Thread Joseph Ashwood
- Original Message - From: Eugen Leitl [EMAIL PROTECTED] Subject: Re: building a true RNG (was: Quantum Computing ...) I've got a framegrabber with a 640x480 24 bit/pixel camera. It doesn't compress, is rather noisy, and since self-adjusting I get the maximum entropy at maximum

Re: authentication protocols

2002-04-01 Thread Joseph Ashwood
- Original Message - From: John Saylor [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, March 25, 2002 3:14 PM Subject: authentication protocols I'd like to find an authentication protocol that fits my needs: 1. 2 [automated] parties 2. no trusted 3rd party intemediary ['Trent'