Encryption of data in smart cards

2003-03-11 Thread N. Raghavendra
Hello, Can anyone point me to sources about encryption of data in smart cards. What I am looking for is protocols for encrypting sensitive data (e.g., medical information about the card-holder), so that even if the card falls into malicious hands, it won't be easy to read that data. Thank you,

Re: Active Countermeasures Against Tempest Attacks

2003-03-11 Thread Bill Stewart
At 09:14 AM 03/10/2003 -0500, Arnold G. Reinhold wrote: On the other hand, remember that the earliest Tempest systems were built using vacuum tubes. An attacker today can carry vast amounts of signal processing power in a briefcase. And while some of the signal processing jobs need to scale with

Re: double shot of snake oil, good conclusion

2003-03-11 Thread Hagai Bar-El
Tal, I am in full agreement with your opinion. I do not think security is an all or nothing property, and I do think that mechanisms can be considered effective even if they do not protect against attackers with some level of skill or motivation. After all, there is no complete security and

Re: Proven Primes

2003-03-11 Thread Tero Kivinen
Ben Laurie writes: I actually just finished finding the 16384 bit Diffie-Helman group with same kind of parameters. It took about 9.5 months to generate. The 12288 bit group took only about 15 days to generate. I have to admit to surprise at the time involved - what s/w are you using to

Khalid Sheikh Mohammed caught partially by Echelon?

2003-03-11 Thread Perry E. Metzger
The guardian reports (unsurprisingly) that Echelon was used in tracking Khalid Sheikh Mohammed's mobile phones: http://www.guardian.co.uk/alqaida/story/0,12469,911860,00.html -- Perry E. Metzger[EMAIL PROTECTED]

Re: Active Countermeasures Against Tempest Attacks

2003-03-11 Thread Arnold G. Reinhold
At 11:43 PM -0800 3/10/03, Bill Stewart wrote: At 09:14 AM 03/10/2003 -0500, Arnold G. Reinhold wrote: On the other hand, remember that the earliest Tempest systems were built using vacuum tubes. An attacker today can carry vast amounts of signal processing power in a briefcase. And while some of

Re: Proven Primes

2003-03-11 Thread tom st denis
--- Tero Kivinen [EMAIL PROTECTED] wrote: SOPHIE GERMAIN PRIME SEARCH FIXED 64 bits. INDEX 0: PRIME (bits 512), index = 131, 0.989151 seconds: 0xc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a439d What is the

Re: Proven Primes

2003-03-11 Thread Anton Stiglic
- Original Message - From: tom st denis [EMAIL PROTECTED] To: Cryptography [EMAIL PROTECTED] Sent: Tuesday, March 11, 2003 11:28 AM Subject: Re: Proven Primes --- Tero Kivinen [EMAIL PROTECTED] wrote: SOPHIE GERMAIN PRIME SEARCH FIXED 64 bits. INDEX 0: PRIME (bits 512), index

Re: Active Countermeasures Against Tempest Attacks

2003-03-11 Thread Gregory Hicks
Date: Mon, 10 Mar 2003 23:43:28 -0800 From: Bill Stewart [EMAIL PROTECTED] At 09:14 AM 03/10/2003 -0500, Arnold G. Reinhold wrote: On the other hand, remember that the earliest Tempest systems were built using vacuum tubes. An attacker today can carry vast amounts [...snip...]

Re: Proven Primes

2003-03-11 Thread Tero Kivinen
tom st denis writes: 0xc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a439d What is the benefit of having leading/trailing bits fixed? Those primes are generated using the rules defined in the RFC 2412. As far as I

[IP] Inter-University Competition in Information Assurance

2003-03-11 Thread R. A. Hettinga
--- begin forwarded text Status: RO User-Agent: Microsoft-Entourage/10.1.1.2418 Date: Tue, 11 Mar 2003 02:27:40 -0500 Subject: [IP] Inter-University Competition in Information Assurance From: Dave Farber [EMAIL PROTECTED] To: ip [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Reply-To:

Groove shills for the DoD: Kapor quits board

2003-03-11 Thread Steve Schear
Software Pioneer Quits Board of Groove By JOHN MARKOFF SAN FRANCISCO, March 10 — Mitchell D. Kapor, a personal computer industry software pioneer and a civil liberties activist, has resigned from the board of Groove Networks after learning that the company's software was being used by the