How useful is www.crypto.com/exports/mail.txt?

2003-03-31 Thread Matt Blaze
For the last three years, I've operated a mail alias, [EMAIL PROTECTED], that publicly archives and forwards to the government authorities announcements of the public availability of cryptographic software. The idea was that since current US export regulations require notifying the government any

Re: Delta CAPPS-2 watch: decrypt boarding passes!

2003-03-08 Thread Matt Blaze
At most airports, they've moved most of the screening to the security checkpoint, where they do the dump search of the people with the on the boarding pass and the lucky random selectees. For flights with people on them, they also have TSA people to screen them at the gate. I've not

Re: Roger Needham Died - from The Register

2003-03-05 Thread Matt Blaze
Sad, sad news. Roger's pioneering contributions to our art speak (volumes) for themselves, and our field is diminished by the loss of his future insights. But I will miss him most for his enormous generosity, his sharp wit, and his personal integrity. -matt Obit: Roger

Re: [Bodo Moeller bodo@openssl.org] OpenSSL Security Advisory: Timing-based attacks on SSL/TLS with CBC encryption

2003-02-24 Thread Matt Blaze
SMB writes: I'm struck by the similarity of this attack to Matt Blaze's master key paper. In each case, you're guessing at one position at a time, and using the response of the security system as an oracle. What's crucial in both cases is the one-at-a-time aspect -- that's what makes the

Re: Columbia crypto box

2003-02-08 Thread Matt Blaze
John, Your snipe at NASA is probably uncalled for. A sentence fragment quoted from a spokesperson at press conference almost certainly does not reflect the professional judgment of the people who designed the system. As someone who is occasionally quoted (and just as often misquoted) in the

final version of lock paper now available

2003-02-07 Thread Matt Blaze
For those who are interested, the final version of my paper on cryptology and locks is available at http://www.crypto.com/papers/mk.pdf (the old version is still online at mk20020915.pdf in the same directory). This is a 4MB file (it contains a bunch of moderate resolution images). -matt

Re: Keep it secret, stupid!

2003-01-27 Thread Matt Blaze
The tragic part is that there are alternatives. There are several lock designs that turn out to resist this threat, including master rings and bicentric locks. While these designs aren't perfect, they I think it is worth pointing out that, while master ring systems (and master-keyed

Re: Keep it secret, stupid!

2003-01-26 Thread Matt Blaze
Matt Blaze wrote: Once I understood the basics, I quickly discovered, or more accurately re-discovered, a simple and practical rights amplification (or privilege escalation) attack to which most master-keyed locks are vulnerable. http://www.crypto.com/masterkey.html Matt

Re: [IP] Master Key Copying Revealed (Matt Blaze of ATT Labs)

2003-01-24 Thread Matt Blaze
Actually even in their Biaxial design the sidebar hole is always on the bottom pin, and so the master shares the angle with the change keys. -matt There is, however, a newer medeco design that uses a drill-hole instead of a groove. With that design you can have the pin twist be different at

Patents as a security mechanism

2003-01-21 Thread Matt Blaze
Patents were originally intended, and are usually used (for better or for worse), as a mechanism for protecting inventors and their licensees from competition. But I've noticed a couple of areas where patents are also used as a security mechanism, aiming to prevent the unauthorized production of

Re: DeCSS, crypto, law, and economics

2003-01-08 Thread Matt Blaze
Isn't it about a million times more probable that the industry's main concern was PEOPLE RIPPING DVDS AND TRADING THE FILES? Well, zone locking helps curb this because it *reduces* the market for each copy. The finer the zone locking resolution, the more effort an attacker needs to make

Re: password-cracking by journalists...

2002-01-18 Thread Matt Blaze
17 USC 1204 (a) In General. - Any person who violates section 1201 or 1202 willfully and for purposes of commercial advantage or private financial gain -(1) shall be fined not more than $500,000 or imprisoned for not more than 5 years, or both, for the first offense... Does this

FC'02 accepted papers

2001-12-27 Thread Matt Blaze
The following is the preliminary list of accepted papers for Financial Cryptography 2002. For information on the conference, including registration, see http://fc02.ai Paper: 017 Authors: Markus Jakobsson Title: Low-Cost Hash Sequence Traversal - Paper: 020 Authors: Markus

Revised CFP (extended deadline): Financial Cryptography 2002

2001-11-01 Thread Matt Blaze
General Chair: Nicko van Someren (nCipher) Program Committee: Matt Blaze, Program Chair (ATT Labs) Dan Boneh (Stanford University) Stefan Brands (Zero Knowledge) Dan Geer (@stake) Ian Goldberg (Zero Knowledge) Angelos Keromytis (Columbia University) Paul Kocher (Cryptography Research) Ron

Re: The tragedy in NYC

2001-09-13 Thread Matt Blaze
that September 11th will be remembered as the day that everything changed in America. Yes, everything changed yesterday, but we needn't allow it to change us. Matt Blaze New York, 12 September 2001 - The Cryptography Mailing List

CFP: Financial Cryptography '02

2001-08-21 Thread Matt Blaze
to authors: December 23, 2001 Camera-ready papers due: February 4, 2002 General Chair: Nicko van Someren (nCipher) Program Committee: Matt Blaze, Program Chair (ATT Labs) Dan Boneh (Stanford University) Stefan Brands (Zero Knowledge) Dan Geer (@stake) Ian Goldberg (Zero Knowledge) Angelos Keromytis

New results on WEP (fwd)

2001-07-26 Thread Matt Blaze
Adi Shamir and his colleagues have some interesting new results on RC4 with a practical attack against WEP. With Adi's permission, I've made available a (PostScript) copy of a draft of his paper at: http://www.crypto.com/papers/others/rc4_ksaproc.ps (Fortunately, as far as I know WEP isn't

Re: Tamperproof devices and backdoors

2001-05-25 Thread Matt Blaze
On the Other Other Hand, I vaguely remember a neat paper by Matt Blaze some years ago that shows that certain classes of back doors, like good back doors in conventional crypto systems, are equivalent in difficulty to building a public key system. Anyone remember the name of the paper