Re: authentication protocols

2002-03-30 Thread David Jablon
John, Do your parties have any shared secret information? If they share a cryptographic key, they can use a simple hash-based challenge/response protocol. If the have shared passwords or any other small secrets, they can use EKE or SPEKE. There are lots of neat tricks that might be

Re: DMCA Still Faces Its First Criminal Test

2002-03-30 Thread Seth David Schoen
R. A. Hettinga writes: http://www.law.com/cgi-bin/gx.cgi/AppLogic+FTContentServer?pagename=law/Viewc=Articlecid=ZZZU66KQBZClive=truecst=1pc=0pa=0s=NewsExpIgnore=trueshowsummary=0 March 28, 2002 DMCA Still Faces Its First Criminal Test Criminal case will test Digital Copyright

Re: ciphersaber-2 human memorable test vectors

2002-03-30 Thread Jeff Cours
On Fri, 29 Mar 2002, Adam Back wrote: Any takers on ciphersaber-2 test vectors which are also topical and amusing english phrases? Is there a faster way to search the test vector space than brute force? Only certain output values from the PRNG will transform alphanumeric characters into other

Re: ciphersaber-2 human memorable test vectors

2002-03-30 Thread Adam Back
On Sat, Mar 30, 2002 at 08:27:02AM -0800, Jeff Cours wrote: On Fri, 29 Mar 2002, Adam Back wrote: Any takers on ciphersaber-2 test vectors which are also topical and amusing english phrases? Is there a faster way to search the test vector space than brute force? Only certain output