[EMAIL PROTECTED] wrote:
The Locate appliance sits passively on the network and
analyzes packets in real time to garner ID info from sources
like Active Directory, IM and e-mail traffic, then associates
this data with network information.
This is really nothing new --
So...
Suppose I want a function to provide integrity and authentication, and
that is to be combined with a stream cipher (as is the plaintext). I
believe that authentication is free once I have integrity given the
fact that the hash value is superencrypted using the stream cipher,
whose key is
On Sun, May 14, 2006 at 03:04:41AM -0500, Travis H. wrote:
Suppose I want a function to provide integrity and authentication, and
that is to be combined with a stream cipher (as is the plaintext). I
believe that authentication is free once I have integrity given the
fact that the hash value
Ivan Krstic [EMAIL PROTECTED] writes:
Calling this piercing network anonymity in real time is highly
misleading; in reality, it's more like making it bloody obvious
that there's no such thing as network anonymity.
No. Ever hear of Chaum's Dining Cryptographers [1]? Anonymity
right there at
On 5/14/06, Eric Rescorla [EMAIL PROTECTED] wrote:
Consider the case where you're transmitting message M. The
hash is H(M). You then encrypt (M || H(M)), generating
K XOR (M || H(M)). If the attacker knows M and H, he can
compute (M || H(M)) and compute K. Then he can re-encrypt
a message M' of
On 5/14/06, Victor Duchovni [EMAIL PROTECTED] wrote:
Security is fragile. Deviating from well understood primitives may be
good research, but is not good engineering. Especially fragile are:
Point taken. This is not for a production system, it's a research thing.
TLS (available via OpenSSL)
- Stream ciphers (additive)
This reminds me, when people talk about linearity with regard to a
function, for example CRCs, exactly what sense of the word do they
mean? I can understand f(x) = ax + b being linear, but how exactly
does XOR get involved, and are there +-linear functions and
On Sun, May 14, 2006 at 07:56:17PM -0500, Travis H. wrote:
On 5/14/06, Victor Duchovni [EMAIL PROTECTED] wrote:
Security is fragile. Deviating from well understood primitives may be
good research, but is not good engineering. Especially fragile are:
Point taken. This is not for a