Here's the old SAFE Act:
http://thomas.loc.gov/cgi-bin/bdquery/z?d105:h.r.00695:
From: Declan McCullagh [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Date: Fri, 07 Feb 2003 21:53:58 -0500
Thanks to Joe for being the first one to submit this... Here's a duplicate
URL if the original is too slow:
As reported by AP:
| Among the most important [debris] they were seeking was
| a device that allows for the encryption of communication
| between the shuttle and NASA controllers. A NASA spokesman
| in Houston, John Ira Petty, said Friday that NASA feared
| the technology could be used to send
John,
Your snipe at NASA is probably uncalled for. A sentence fragment
quoted from a spokesperson at press conference almost certainly
does not reflect the professional judgment of the people who designed
the system.
As someone who is occasionally quoted (and just as often misquoted)
in the
At 12:41 AM 2/8/2003 -0500, John S. Denker wrote:
As reported by AP:
| Among the most important [debris] they were seeking was
| a device that allows for the encryption of communication
| between the shuttle and NASA controllers. A NASA spokesman
| in Houston, John Ira Petty, said Friday that
On Sat, Feb 08, 2003 at 01:24:14PM -0500, Tim Dierks wrote:
There may be more valid reasons for treating the device as secret; some
categories that come to mind include protecting non-cryptographic
information, such as the capabilities of the communication channel. Also,
many systems on the
On Sat, Feb 08, 2003 at 01:36:46PM -0500, Adam Fields wrote:
On Sat, Feb 08, 2003 at 01:24:14PM -0500, Tim Dierks wrote:
There may be more valid reasons for treating the device as secret; some
categories that come to mind include protecting non-cryptographic
information, such as the
--- begin forwarded text
From: pplf [EMAIL PROTECTED]
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2.1) Gecko/20021130)
To: [EMAIL PROTECTED]
Subject: Zimmermann creates a non-free command-line OpenPGP product
Sender: [EMAIL PROTECTED]
Date: Sat, 08 Feb 2003 09:44:09 +0100
Status:
Apparently some folks skipped class the day Kerchhoffs'
Principle was covered.
While this is obvious to the oldtimers, I had to look Kerkhoffs principle
( and found that it is the old injunction against security by obscurity ).
So for the benefit of those who are as clueless as me:
The Handbook of Applied Cryptography ( menezes et al ) is available online at
http://www.cacr.math.uwaterloo.ca/hac/
My apologies if the other list members were aware of this.
There is also an interesting Lecture Notes on Cryptography by Goldwasser
and M. Bellare at :
On Sat, Feb 08, 2003 at 01:36:46PM -0500, Adam Fields wrote:
On Sat, Feb 08, 2003 at 01:24:14PM -0500, Tim Dierks wrote:
There may be more valid reasons for treating the device as secret; some
categories that come to mind include protecting non-cryptographic
information, such as the
On Sat, Feb 08, 2003 at 03:26:53PM -0800, Bill Stewart wrote:
It'd be lame, but it's possible.
It's probably just every-day insitutionalised paranoia. It doesn't
matter why they care, the sticker on the outside says they have
to.
--
Dan.
AP reported on Feb 7 that NASA is looking for a secret device that
encrypts communication between the shuttle and ground controllers.
If someone else finds it they could study the technology, says the
AP. Sounds like fun for cypherpunks. Anybody seen it on eBay? :-)
Alternatively, c'punks
In message [EMAIL PROTECTED], Faust writes:
Apparently some folks skipped class the day Kerchhoffs'
Principle was covered.
While this is obvious to the oldtimers, I had to look Kerkhoffs principle
( and found that it is the old injunction against security by obscurity ).
You can find
Matt wrote quoting John:
Do you really, honestly believe that none of the people
designing a secure communication system for the shuttle were
even remotely acquainted with the basic principles of the
subject?
[...]
Apparently some folks skipped class the day Kerchhoffs'
Principle was
[Apologies if this item was passed through the list. It was news to me.]
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG
K. Jallad, J. Katz, and B. Schneier
Information Security Conference 2002 Proceedings, Springer-Verlag, 2002, to
appear.
ABSTRACT: We recently noted that
15 matches
Mail list logo