Recognizing the Dance on the Dotted Line

2003-03-13 Thread R. A. Hettinga
http://www.nytimes.com/2003/03/13/technology/circuits/13next.html?tntemail0=pagewanted=printposition=top March 13, 2003 Recognizing the Dance on the Dotted Line By IAN AUSTEN IN the movies, biometrics can give a high-tech sheen to an ordinary task like establishing that someone is who he

Re: Scientists question electronic voting

2003-03-13 Thread Notable Software
Ed, The whole idea of photographing paper ballots is a straw man. It is akin to saying that people will just run through red lights anyway so we shouldn't place them at intersections. I agree that we need to improve voting systems, but the current trend toward self-auditing devices is going

Re: Encryption of data in smart cards

2003-03-13 Thread John Kelsey
At 11:08 PM 3/12/03 +0100, Krister Walfridsson wrote: ... This is not completely true -- I have seen some high-end cards that use the PIN code entered by the user as the encryption key. And it is quite easy to do similar things on Java cards... With any kind of reasonable PIN length, though,

RE: Encryption of data in smart cards

2003-03-13 Thread Trei, Peter
John Kelsey[SMTP:[EMAIL PROTECTED] At 11:08 PM 3/12/03 +0100, Krister Walfridsson wrote: ... This is not completely true -- I have seen some high-end cards that use the PIN code entered by the user as the encryption key. And it is quite easy to do similar things on Java cards...

Diffie-Hellman 128 bit

2003-03-13 Thread NOP
I am looking at attacks on Diffie-Hellman. The protocol implementation I'm looking at designed their diffie-hellman using 128 bit primes (generated each time, yet P-1/2 will be a prime, so no go on pohlig-hellman attack), so what attacks are there that I can look at to come up with either the

Re: Encryption of data in smart cards

2003-03-13 Thread Anne Lynn Wheeler
At 01:13 PM 3/13/2003 -0500, John Kelsey wrote: At 11:08 PM 3/12/03 +0100, Krister Walfridsson wrote: ... This is not completely true -- I have seen some high-end cards that use the PIN code entered by the user as the encryption key. And it is quite easy to do similar things on Java cards...

Microsoft: Palladium will not limit what you can run

2003-03-13 Thread Hermes Remailer
The following comes from Microsoft's recent mailing of their awkwardly named Windows Trusted Platform Technologies Information Newsletter March 2003. Since they've abandoned the Palladium name they are forced to use this cumbersome title. Hopefully this will shed light on the frequent claims

Re: Microsoft: Palladium will not limit what you can run

2003-03-13 Thread Jay Sulzberger
On Thu, 13 Mar 2003, Hermes Remailer wrote: The following comes from Microsoft's recent mailing of their awkwardly named Windows Trusted Platform Technologies Information Newsletter March 2003. Since they've abandoned the Palladium name they are forced to use this cumbersome title.