Re: Columbia crypto box

2003-02-10 Thread Adam Fields
potential solutions to this. -- - Adam - Adam Fields, Managing Partner, [EMAIL PROTECTED] Surgam, Inc. is a technology consulting firm with strong background in delivering scalable and robust enterprise web and IT applications. http://www.adamfields.com

Re: Columbia crypto box

2003-02-08 Thread Adam Fields
on the shuttle are obsolete by modern standards, and it's possible that the communications security is similarly aged. Isn't it also possible that the device contains a physical key of some kind? -- - Adam - Adam Fields, Managing Partner, [EMAIL PROTECTED] Surgam

Re: Linux-style kernel PRNGs and the FIPS140-2 test

2002-01-15 Thread Adam Fields
Thor Lancelot Simon says: Many operating systems use Linux-style (environmental noise stirred with a hash function) generators to provide random and pseudorandom data on /dev/random and /dev/urandom respectively. A few modify the general Linux design by adding an output buffer which is not

Re: Linux-style kernel PRNGs and the FIPS140-2 test

2002-01-15 Thread Adam Fields
Arnold G. Reinhold says: This result would seem to raise questions about SHA1 and MD5 as much as about the quality of /dev/random and /dev/urandom. Naively, it should be difficult to create input to these hash functions that cause their output to fail any statistical test. I would think

What does it take to be a security professional?

2001-11-09 Thread Adam Fields
I make my living as a technical consultant, doing architecture and programming for mid-to-large-scale enterprise information processing systems (mostly content management infrastructures lately). I have a formal CS education, and I consider myself about as knowledgable an amateur as possible on

Re: Hijackers' e-mails were unencrypted

2001-10-03 Thread Adam Fields
[EMAIL PROTECTED] says: I can just see it coming -- their email was in the clear and we still coudln't find them; imagine how much harder it will be when everybody uses cryptography. I don't think we can win either way. Of course, when everybody uses state-sanctioned security, the