Hello,
Can anyone point me to sources about encryption of data in smart
cards. What I am looking for is protocols for encrypting sensitive
data (e.g., medical information about the card-holder), so that
even if the card falls into malicious hands, it won't be easy to
read that data.
Thank you,
At 09:14 AM 03/10/2003 -0500, Arnold G. Reinhold wrote:
On the other hand, remember that the earliest Tempest systems
were built using vacuum tubes. An attacker today can carry vast amounts
of signal processing power in a briefcase.
And while some of the signal processing jobs need to scale with
Tal,
I am in full agreement with your opinion. I do not think security is an
all or nothing property, and I do think that mechanisms can be considered
effective even if they do not protect against attackers with some level of
skill or motivation. After all, there is no complete security and
Ben Laurie writes:
I actually just finished finding the 16384 bit Diffie-Helman group
with same kind of parameters. It took about 9.5 months to generate.
The 12288 bit group took only about 15 days to generate.
I have to admit to surprise at the time involved - what s/w are you
using to
The guardian reports (unsurprisingly) that Echelon was used in
tracking Khalid Sheikh Mohammed's mobile phones:
http://www.guardian.co.uk/alqaida/story/0,12469,911860,00.html
--
Perry E. Metzger[EMAIL PROTECTED]
At 11:43 PM -0800 3/10/03, Bill Stewart wrote:
At 09:14 AM 03/10/2003 -0500, Arnold G. Reinhold wrote:
On the other hand, remember that the earliest Tempest systems
were built using vacuum tubes. An attacker today can carry vast amounts
of signal processing power in a briefcase.
And while some of
--- Tero Kivinen [EMAIL PROTECTED] wrote:
SOPHIE GERMAIN PRIME SEARCH
FIXED 64 bits.
INDEX 0:
PRIME (bits 512), index = 131, 0.989151 seconds:
0xc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a439d
What is the
- Original Message -
From: tom st denis [EMAIL PROTECTED]
To: Cryptography [EMAIL PROTECTED]
Sent: Tuesday, March 11, 2003 11:28 AM
Subject: Re: Proven Primes
--- Tero Kivinen [EMAIL PROTECTED] wrote:
SOPHIE GERMAIN PRIME SEARCH
FIXED 64 bits.
INDEX 0:
PRIME (bits 512), index
Date: Mon, 10 Mar 2003 23:43:28 -0800
From: Bill Stewart [EMAIL PROTECTED]
At 09:14 AM 03/10/2003 -0500, Arnold G. Reinhold wrote:
On the other hand, remember that the earliest Tempest systems
were built using vacuum tubes. An attacker today can carry vast amounts
[...snip...]
tom st denis writes:
0xc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a439d
What is the benefit of having leading/trailing bits fixed?
Those primes are generated using the rules defined in the RFC 2412.
As far as I
--- begin forwarded text
Status: RO
User-Agent: Microsoft-Entourage/10.1.1.2418
Date: Tue, 11 Mar 2003 02:27:40 -0500
Subject: [IP] Inter-University Competition in Information
Assurance
From: Dave Farber [EMAIL PROTECTED]
To: ip [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Reply-To:
Software Pioneer Quits Board of Groove
By JOHN MARKOFF
SAN FRANCISCO, March 10 Mitchell D. Kapor, a personal computer industry
software pioneer and a civil liberties activist, has resigned from the
board of Groove Networks after learning that the company's software was
being used by the
12 matches
Mail list logo