written
down.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
and
optimising memory, CPU power and amount of parallelism to minimize
Bear Responds:
I really want to read this paper; if we don't get to see the
actual mathematics, claims like this look incredibly like
someone is spreading FUD. Is it available anywhere?
The paper is located here: http
may work on Elliptic Curve systems
as well. Which of these sides is better and which worse
is something that you will have to work out depending on
your own perspective.
Bear
-
The Cryptography
, we can just leave it at real artists have day jobs.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
of your application, I mean -- no point to go off on philosophical
tangents. Answer that, and maybe there'll be a protocol that you
can use.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending
can think of a kilobit-keyed cipher as
a potentially weak link in Lucky's security (worth the attention)
and probably the strongest link in a typical businessman's security
(not worth the attention).
Bear
?
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
, which is relatively cheap) before it
checks the signature itself.
Bear
On Thu, 20 Jun 2002, Bill Frantz wrote:
I have been thinking about how to limit denial of service attacks on a
server which will have to verify signatures on certain transactions. It
seems
DRM means being able to keep and
do whatever you want with the records your business
creates -- but not being able to force someone to
use their real name or linkable identity information
to do business with you if that person wants that
information to remain private.
Bear
movies if need be, but to me trusted
computing means that *I* can trust my computer, not that
someone else can.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL
of
the bignums you'll be working with, it can speed things up
noticeably.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
dynamically.
Bear
On Wed, 3 Jul 2002, John Saylor wrote:
Hi
I'm passing some data through a web client [applet-like] and am planning
on using some crypto to help ensure the data's integrity when the applet
sends it back to me after it has been processed.
The applet has
.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
, it violates the requirements of a cryptographic hash
function, not a simple hash function.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
given ~C and we did not prove anything
about C regardless of our assumptions about A.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
legitimate business.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
the
data ever has sufficient information to reconstruct more of it
than their particular licit use of it requires.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe
On 10 Aug 2002, Eric Rescorla wrote:
It's generally a bad idea to sign RSA data directly. The RSA
primitive is actually quite fragile. At the very least you should
PKCS-1 pad the data.
-Ekr
This is true. Cyclopedia Cryptologia has a short article detailing
some of the attacks against direct
.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
read by any software.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
is actually separate from your
OS (if you're running it on your Mac, or under WINE from Linux,
for example), it shouldn't give him/her access to anything
inside the OS.
Bear
-
The Cryptography Mailing
those whose actions you decry. The only
difference is that the scale of abuses which can be perpetrated
by them is staggeringly large compared to the minor abuse of
someone copying a song or running a program out of license.
Bear
;
but it's *extremely* cool for local authentication.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
released it under the OpenSSL license, you'd have fewer
options, not more.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
poorer cipher named plaintext.
This is completely irrational; either you need security or
you don't.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL
to involve
code talkers, and appeared to be entirely fictional... --Perry]
Bear
On Wed, 2 Oct 2002, Bill Frantz wrote:
While vacationing in Scotland this summer I had a conversation with a
gentleman who said that the British had used Scottish Gaelic speakers as
code
security. It's basically a matter of consumer
protection, and it's really something that security and crypto
people need to do within the industry. It has to be within
the industry, because this is stuff that is well outside
a layman's ability to judge.
Bear
document and a September 30
document which have the same MAC.
What does Bob do now? How does this get Bob the ability to
create something Alice didn't sign, but which has a valid MAC
from Alice's key?
Bear
it fast enough to be competitive - after
which it might bear only a dim resemblance to the hard problem
that inspired it anyhow.
Offhand, I'd say that since it isn't a practical cipher to use
anyway, it's probably not a good use of time for professional
cryptographers to try to break. On the gripping
machines or invented ciphers, patented them, and went broke. It isn't
a coincidence, nor a recent development.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL
that in their next patch release, it was listed number
one in the list of critical bugfixes.
Bear
(who now notes that the company is no longer extant)
-
The Cryptography Mailing List
, but the software to get them from
USPS doesn't have to be as proprietary or restricted as microsoft is
undoubtedly making theirs) it could become very useful. If it becomes
widespread, I might start discarding unread all email from parties
unknown to me that doesn't bear a postmark, in the same
it becomes just a matter of providing a few
definitions in a well-documented file.
If something still has porting problems, I'd say it hasn't been
ported enough.
Bear
-
The Cryptography Mailing
of doing business uphill against trust until one's
issue is trusted, should be shared in something like equal proportions
by people who undertake it voluntarily.
Bear
-
The Cryptography Mailing
the public skepticism regarding the truth of their assertions about
their motivations seems fairly solidly grounded on fact.
Bear
( who likes a fair amount of stuff that is only available
coded for region 6
can all become better servants and markets to our corporate
masters.
All power to the dromedariat!
Bear
PS. If you happen to be mentally defective, you may not recognize
the foregoing as sarcasm. Please take this into account when
composing your
key if the encryption algorithm has weak
keys.
Encrypt(Encrypt(P, Kbob), Kalice) = P
Encrypt(Encrypt(P, Kalice), Kbob) = P
Bear
-
The Cryptography Mailing List
Unsubscribe by sending
it in if I can find it around here.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
reading material for security consultants, HR
staff, employers, designers, and psychologists. It's not
actually the study of cryptography, but it's a topic near
and dear to the heart of those who need security, just as
Matt's paper on locks.
Bear
not to
be that stupid. But it's even worse than that, because people who
ought to know better (and people who *DO* know better, their own
ethics and customers' best interests be damned) are even *DEVELOPING*
for this system. It just doesn't make any damn sense.
Bear
if
used without padding. For details on what that means, read the
cyclopedia cryptologia article on RSA.
http://www.disappearing-inc.com/R/rsa.html
Bear
-
The Cryptography Mailing List
Unsubscribe
for actual use. You want appalling? In the civil
war, they used monoalphabetic substitution as a trench code -- on
both sides.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending
, and
communist party all offer you a bottle of beer for a record of your
vote for them next year, there's no reason why you shouldn't go home
without a six-pack.
Bear
-
The Cryptography Mailing List
the card in the PCMCIA slot, and the machine would unlock.
Slick little device, actually.
Now can we get one that uses more than 5 digits for a key?
Bear
-
The Cryptography Mailing List
Unsubscribe
done.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
to the decisions we make about such systems
now.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
go through
the security booths in airports, and if you've been scanned before
they make sure it matches, and if you haven't you now have a scan on
file so they can make sure it matches next time.
Bear
for it) to anyone who has pockets deep
enough to do the development.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
know this guy. We spent a couple years working on X together.
is different in kind from I met this guy once in my life, and he
had a driver license that said his name was mike.
Bear
-
The Cryptography
On Tue, 25 Mar 2003, Ian Grigg wrote:
On Monday 24 March 2003 19:26, bear wrote:
him running roughshod over the law. He set up routing tables
to fool DNS into thinking his machine was the shortest distance
from the courthouse where she worked to her home ISP and
eavesdropped on her mail
in protecting financial transactions and the
former to people who are more concerned about personal privacy.
Bear
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography
that choice. I can go into my browser's
keyring and delete root certs that have been sold, ever. And I routinely
do. A fair number of sites don't work for me anymore, but I'm okay with
that.
Bear
On Tue, 25 Mar 2003, Ian Grigg wrote:
On Tuesday 25 March 2003 12:07, bear wrote:
But, luckily, there is a way to turn the above
subjective morass of harm into an objective
hard number: civil suit. Presumably, (you
mentioned America, right?) this injured party
filed a civil suit against
53 matches
Mail list logo