Re: biometrics

2002-02-01 Thread pasward
Bill Frantz writes: What would be really nice is to be able to have the same PIN/password for everything. Do you really mean that? Sure, if I only have to remember one thing it is easier for me. It is also a complete nightmare if it is ever compromised. --

Re: biometrics (addenda)

2002-02-01 Thread lynn . wheeler
note however, with regard to the 80 hardware tokens, or 3 hardware tokens, or 1 hardware token scenario a single or small number of hardware tokens (with each hardware token having an associated public key registered multiple places) then can become a personal choice. The current scenario

Losing the Code War

2002-02-01 Thread R. A. Hettinga
http://www.theatlantic.com/issues/2002/02/budiansky.htm The Atlantic Monthly | February 2002 Notes Dispatches Intelligence Losing the Code War The great age of code breaking is over-and with it much of our ability to track the communications of our enemies by Stephen Budiansky .

NCipher Forms Alliance With F5 Networks

2002-02-01 Thread R. A. Hettinga
http://online.wsj.com/article_print/0,4287,ON_CO_20020130_000329,00.html January 30, 2002 NCipher Forms Alliance With F5 Networks DOW JONES NEWSWIRES LONDON -- NCipher, a provider of cryptographic IT security solutions, said it has formed a strategic alliance with F5 Networks, the

Financial Cryptography 2002: Discount rate ends 1st February

2002-02-01 Thread Nicko van Someren
Please note The discount registration rate is only available until the 1st of February 2002. After this date registration will be changed at the full rate. * Financial Cryptography 2002 March 11-14, 2002 Southhampton, Bermuda Call for Participation Financial

Re: biometrics

2002-02-01 Thread Bill Frantz
At 5:13 AM -0800 1/30/02, [EMAIL PROTECTED] wrote: Bill Frantz writes: What would be really nice is to be able to have the same PIN/password for everything. Do you really mean that? Sure, if I only have to remember one thing it is easier for me. It is also a complete nightmare if it is

available draft chapters and lectures on `secure communication and commerce using crypto`

2002-02-01 Thread Amir Herzberg
Hi all, As you may already know, I'm working on a text-book, to be published by Prentice Hall, titled: Introduction to Secure Communication and Commerce Using Cryptography. Lectures covering much of the material, and a fair number of draft chapters, are now available online; see

Re: Cringely Gives KnowNow Some Unbelievable Free Press... (fwd)

2002-02-01 Thread jamesd
-- On 27 Jan 2002, at 21:17, Eugene Leitl wrote: I think the only patents of particular note for ECC are Certicom and H.P.'s ones on point-compression. The original paper on ECC proposed point compression and described the algorithm in 1985. See Bernstein's web page

More Elcomsoft/Sklyarov Motions

2002-02-01 Thread John Young
Thanks to Kurt Foss we offer two additional dismissal motions by Elcom/Elcomsoft and Dmitry Sklyarov: Notice of Motion and Motion to Dismiss Indictment for Lack of Jurisdiction Notice of Motion and Motion to Dismiss Count One: Conspiracy http://cryptome.org/usa-v-esds-nmd.htm

'Trusted Traveler' Pass

2002-02-01 Thread R. A. Hettinga
http://online.wsj.com/article_print/0,4287,SB1012341813532435520,00.html January 30, 2002 THE MIDDLE SEAT By SCOTT MCCARTNEY A 'Trusted Traveler' Pass May Be In the Cards for Frequent Fliers ABOUT SCOTT MCCARTNEY Some day in the future, maybe a year from now, you may have a trusted

FW: update.575

2002-02-01 Thread Kossmann, Bill
The article below may be of interest to members of this list. Bill -Original Message- From: AIP listserver [mailto:[EMAIL PROTECTED]] Sent: Wednesday, January 30, 2002 09:04 To: [EMAIL PROTECTED] Subject: update.575 PHYSICS NEWS UPDATE The American Institute

An attack on the 'Trusted Traveler' Pass

2002-02-01 Thread D. A. Honig
Some day in the future, maybe a year from now, you may have a trusted traveler card. Congress wants it, the airlines need it and security experts endorse it. The benefits appear clear. With a tool to separate the wheat from the So does an attack. Befriend someone with such a card, give her a

Re: Cringely Gives KnowNow Some Unbelievable Free Press... (fwd)

2002-02-01 Thread Arnold G. Reinhold
At 7:38 AM -0800 1/29/02, Eric Rescorla wrote: Ben Laurie [EMAIL PROTECTED] writes: Eric Rescorla wrote: BTW, I don't see why using a passphrase to a key makes you vulnerable to a dictionary attack (like, you really are going to have a dictionary of all possible 1024 bit keys crossed with

Re: [open-source] File encryption

2002-02-01 Thread George Schoelles
On Tuesday 29 January 2002 06:50 pm, Jei wrote: -- Forwarded message -- Date: Mon, 28 Jan 2002 10:29:43 -0500 From: Matt Blaze [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Re: [open-source] File encryption Just to echo Whit's two file encryption virtues (the laptop and

CFS vs. loopback encryption (was Re: [open-source] File encryption)

2002-02-01 Thread Nicholas Brawn
What are people's thoughts on CFS vs. loopback encryption? I've used CFS in the past and found it quite useful, though as Matt said - a little long in the tooth. Never really looked into loopback encryption (which I'm aware is not something present across the majority of Unixes). Nick --

Losing the Code War by Stephen Budiansky

2002-02-01 Thread marius
But there was an utterly trivial fix that DES users could employ if they were worried about security: they could simply encrypt each message twice, turning 56-bit DES into 112-bit DES, and squaring the number of key sequences that a code breaker would have to try. Messages could even be