The govt. puts the blame on the intelligence for
failing and the intelligence community blames it on
tough laws that prevent them from eavesdropping. Then
they all go amending laws, show their commitment to
the public and reach a win-win situation. Somebody
somewhere should be responsible to take
This is very bad news. A lot of people will loose
their homes to private 'economic developers'. It
certainly means no right to have a permenant home.
When suburbs start developing, the people are going to
be evicted over and over. How long will this continue?
If they cant do any good for
--- Cletus Emmanuel [EMAIL PROTECTED] wrote:
Two conjectures (or are they?):
1. The order of an integer 'a' modulo P^m =
P^(m-1)*(Order of a mod P); where P
is an odd prime .
2. If a, m, and n are elements of Z and (a,mn) = 1,
then Order of a mod mn =
QR/(Q,R); where Q = Order of a mod m and R
The Homeland Security Department's justification for
the electronic strip searches has a certain logic. In
field test after field test, it found that federal
airport screeners using metal-detecting magnetometers
did a miserable job identifying weapons concealed in
carry-on bags or on the bodies of
hi,
--- Adam Back [EMAIL PROTECTED] wrote:
There is a simple protocol for this described in
Schneier's Applied
Crypto if you have one handy...
Yes, I found it. Thankyou.
--- cypherpunk [EMAIL PROTECTED] wrote:
That is
known as a multi party computation or MPC
True, Its a secure MPC
hi,
If user A has the integer a and user B has the integer
b, can a zero knowledge proof be developed to show
that ab,ab or a=b.
Thankyou,
Sarad.
Yahoo! Mail
Stay connected, organized, and protected. Take the tour:
http://tour.mail.yahoo.com/mailtour.html
--- Tyler Durden [EMAIL PROTECTED] wrote:
Let us remember, of course, that the digits of pi
are not random
whatsoever: they are the digits of pi! Random is in
the eye of the
beholder.
-TD
Exactly. What an algorithm gives out is always
deterministic. We try to see if there is some
hi,
--- Gil Hamilton [EMAIL PROTECTED] wrote:
For example, is this sequence
of bits random:
01100100010? How about this one: 00? From
a true random number
generator, both are completely possible and equally
valid.
Random as in the sense guessable and thus posing a
problem to the
Mentioned on the Fox show 24.
http://www.schneier.com/blog/archives/2005/04/blowfish_on_24.html
http://video.google.com/videopreview?q=blowfishtime=3205000page=1docid=4616599194372365303urlcreated=1114565588chan=KTVUprog=24+%7C+Day+4%3A+1%3A00AM-2%3A00AMdate=Mon+Apr+25+2005+at+9%3A00+PM+PDT
hi,
news below:
http://www.net4nowt.com/isp_news/news_article.asp?News_ID=2809
Google is way too fast. Whats the difference seraching
using google in 10 milliseconds and in 5
milliseconds?Perhaps they are taking some load off
their server? I fail to see how it is useful to the
search client.
hi,
Maybe it was just a bot parsing the contents of the
mail. Cannot say for sure. Reading every ones g-mail
doesn't appear to be practical.
Sarad.
--- Eugen Leitl [EMAIL PROTECTED] wrote:
At 09:17 17/03/2005, Biju Chacko wrote:
Ok, that does it. I am now convinced that Google is
the new
hi,
After looking at RFC1323 below
http://www.cse.ohio-state.edu/cgi-bin/rfc/rfc1323.html#sec-4
the only reasonable option is to use the time old
pseudorandom numbers for TCP sequence numbers in the
TCP IP stack.
Another option would be to synchronize the client with
NTP but that wouldn't work
hi,
Tyler Durden wrote:
Are there certain images that can hide stego more
effectively? IN other words,
these images should have a lot of spectral energy in
the same frequency bands where Stego would normally
show.
Yes, there should be a lot of noise in the image, some
way or the other. If you
hi,
They had been researching on this line in Indian
Institue of Science, Bangalore. I think image
searching has fundamental limits. For successfully
matching two images, there should be a subset of
information in both that totally match or match with a
high probability.
Expecting a front view
--- R.A. Hettinga [EMAIL PROTECTED] wrote:
When asked about
the issue that most
influenced their vote, voters were given the option
of saying moral
values. But that phrase can mean anything - or
nothing. Who doesn't vote
on moral values? If you ask an inept question, you
get a misleading
hello,
The C code for the blowfish encryption algorithm
posted in Mr.Schneier's site, acocording to Michael.B
still 'chokes' as it is not corrected even though the
bug report, mentions that it is a fatal bug.
The bug report is available at
http://www.schneier.com/blowfish-bug.txt
His opinion is
--- Major Variola (ret) [EMAIL PROTECTED] wrote:
Can someone explain how finding regularity in the
distribution of primes
would affect any modexp() system? Suppose that you
have a function
F(i) which gives you the i-th prime. Since the PK
systems (eg RSA, DH)
use *randomness* to
hello,
The security of elliptic curve cryptosystems depend on
the difficulty in solving the elliptic curve discrete
log problem(ECDLP). If any body gets to prove that
P=NP, then all the public key cryptosystemts which
rely on 'hard' problems will be useless for crypto.
Sarath.
--- Sunder
hello,
the election commision of india had a proposal to the
govt. that the voter should be able to vote for 'none
of the above'. Though one can predict that such a
proposal will never be approved by the government, it
makes a lot of sense. Is any other democratic country
seriously thinking of
--- R. A. Hettinga [EMAIL PROTECTED] wrote:
This would
SEEM to put the SHA family into jeopardy as well,
but we should know
more tomorrow evening.
John Black
Wasn't the attack to find two chosen messages hashing
to the same value? But that doesn't mean that it is
easy to find a message
hi,
Since they are using symmetric keys, for a network of
'n' nodes, each node need to know the secret key that
they share with the remaining (n-1) nodes.Total number
of symmetric keys that need to be distributed is
[n*(n-1)]/2. Key management is harder when they
network gets larger.
Sarath.
You can pick a few of them by looking in the eye. They
are usually very sharp people.
Sarath.
Secret Service people are notoriously known for
being snappy dressers,
said Capt. Steve Luckey, security chairman for the
Air Line Pilots
Association.
I can't stop outsourcing.Don't blame me.Blame your own
govt.
Sarath.
--- Major Variola (ret) [EMAIL PROTECTED] wrote:
At 09:55 PM 3/12/04 -0800, Sarad AV wrote:
if gcd(a,m)=1,
for a*a inverse==1 mod m
is it better to find
a invese=a^(m-2) mod m by binary exponentiation
modulo m
--- Tyler Durden [EMAIL PROTECTED] wrote:
And are you trying to suggest (On Cypherpunks, of
all places) that the US
government should somehow regulate outsourcing?
It doesnot matter what i think.Neither can I help it
It already is
http://news.bbc.co.uk/1/hi/business/3535893.stm
Any way,I
Perhaps,its because they need the funds. Have to pull
wool over their eyes,to get the money.
--- sunder [EMAIL PROTECTED] wrote:
R. A. Hettinga wrote:
Hmmm... Actual progress on old news is new news,
right?
Not when it pretends to be a new and wonderful idea,
and ignores its past.
hi,
if gcd(a,m)=1,
for a*a inverse==1 mod m
is it better to find
a invese=a^(m-2) mod m by binary exponentiation
modulo m or is it more time efficient by extended
euclids algorithm for large 'm'?
thanks.
Sarath.
__
Do you Yahoo!?
Yahoo! Mail - More reliable,
doesn't sound good,hope all the court rooms will be
able to authenticate the tape,I mean a very good
editing tool and a CG expert working on it may come
out with real frightening stuff.
Who would say that the dinasours of jurrasic park
didn't look real :)
Sarath.
--- R. A. Hettinga [EMAIL
Most of the .com's I've worked at, the CEO was hired
to do one single
thing: pump up the image of the company to make it
look like a big jucy
steak when it was all crap internally, then sell the
turd off to a sucker.
This of course results in the immediate job loss
of 90% of the
They must be doing it all time.It now just turned out
as a diplomatic issue.
Sarath.
--- Tyler Durden [EMAIL PROTECTED] wrote:
Looks like the UN's going to need some encrypted
VoIP...
-TD
From: Major Variola (ret.) [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
--- Jim Dixon [EMAIL PROTECTED] wrote:
Meaning that 150,000 engineers are employed in
Bangalore? Does this
include software engineers, HTML coders,
programmers, computer scientists?
Computer scientists are very few. Most engineering
colleges and teachers emphasis simple on coding. If
you
Today, Bangalore stands ahead of Bay Area, San
Francisco and California,
with a lead of 20,000 techies, while employing a
total number of 1.5 lakh
engineers.
I live in bangalore,those figures are correct.
However, the educational system has to be seen to be
fully appreciated.
I spent
hi,
Asking questions is part of learning. Unless one
learns how is he expected to participate and make once
in a while intelliget discussions?
Give noobs some space and time to learn and over time
they will contribute to the list.
I think when I was a kid, it took me quite a few
months to
hi,
I just a pick a book and learn and if i am in doubt,
ofcourse i do have a lot of stupid ones. but thats how
i learn.
I have friends who will help me with my queries. I
prefer not getting flamed like every one else and that
too in quick succesion :-). so my guess is that as far
as newbies are
hi,
Keep
K =Original Key
P =Original Plain Text
C =Original cipher text
D=Dummy plain text
C'=Dummy cipher text
K'=Dummy key
use a symmetric key encryption algorithm with a secret
key 'k' over plain text 'P' to obtain cipher text 'C'
Then we find
k'= C (xor) D
Preferably D is atleast as long
HI,
TD wrote-
that, increased use of
crypto implies increased cost of monitoring.
If a larger population starts using cryptography, we
can compare it to U.S mail. The govt. any way can't go
through all the snail mails due to its sheer volume.
They rely on other methods to detect and nullify
helo,
thank you for the reply.
The algorithm you describe is linear, not log.
Complexity measures are a
function of the size of the input data set in bits.
In general, a large
integer M will require an input around N = LOG2(M)
bits to represent.
If we are to convert a k-bit integer n
[EMAIL PROTECTED] ,good work!
--- Tim May [EMAIL PROTECTED] wrote:
On Wednesday, October 8, 2003, at 06:16 AM, Sarad
AV wrote:
hi,
If we are to convert a k-bit integer n to a base b
number,it takes us O(log n) if the base b is a
power
of 2.
eg. converting (1)base to base
hi,
You may then need to pass a bill that gives you the
right to kick them out of office if they don't
fullfill atleast 50% of what they promised in a given
time frame.
Sarath.
--- John Kelsey [EMAIL PROTECTED] wrote:
At 04:37 AM 9/22/03 -0700, you wrote:
hi,
Vote for some one who
hi,
Vote for some one who promises freedom,democracy and
development. Is that so hard?
Sarath.
--- Tyler Durden [EMAIL PROTECTED] wrote:
I guess in the end we are responsible for the
actions our government takes.
And if we remain ignorant and continue to benefit
(and do nothing to stop
and not two elements of the set.
x*y (ie, left*top) can be followed.
Regards Sarath.
--- BillyGOTO [EMAIL PROTECTED] wrote:
On Thu, Aug 28, 2003 at 12:14:20AM -0700, Sarad AV
wrote:
hi,
Table shown is completed to define 'associative'
binary operation * on S={a,b,c,d}.
*|a|b|c|d
hi,
Table shown is completed to define 'associative'
binary operation * on S={a,b,c,d}.
*|a|b|c|d
-
a|a|b|c|d
-
b|b|a|c|d
-
c|c|d|c|d
-
d|d|c|c|d
The operation * is associative iff (a*b)*c=a*(b*c) for
all a,b,c element of set S.
So can (a*d)*d=a*(d*d)=d
hi,
--- martin f krafft [EMAIL PROTECTED] wrote:
Okay- I need 5 bits to represent 32 coins.I count
as
coin 0,coin 1,... coin 31.
No, you can't count coin 0. Or how will you
represent no coins?
I thought i could use the null set to point to the
first coin,simply as a one to one mapping
hi,
Hope you can help on this.
--- Tim May [EMAIL PROTECTED] wrote:
I hope you are not saying that you think there will
always be 16 heads
and 16 tails!
In a perfectly random experiment,how many tails and
how many heads do we get?
thanks.
Regards Sarath.
hi,
Thank you-one more question.
Will the information obtained from the 2^32 tests have
a zero compression rate?
If one of the occurance should yield all heads and one
occurance yields all tails-there appears to be scope
for compression.
If the output is random,then it will have no
mathametical
hi,
Okay- I need 5 bits to represent 32 coins.I count as
coin 0,coin 1,... coin 31.
If it is a perfectly random fair coin throwing
experiment,then 50 percent of them will be heads.
So I know that 16 of them will be heads.
What we do is i simply place all the 32 coins on the
table in a row or
it comes to such a question-
I do a fair coin throwing experiment with 64 coins.
To represent 64 coins,i need 5 bits of information.
To represnet 64 coins,i need 6 bits of infomation :)
Regards Sarath.
__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use
hi,
There wasn't much of traffic congestion on the
manhatten roads when they showed the images on bbc.
The manhatten road network is used in examples of
deflection routing. Also roads every where should be
like that :-)
In India during summer-we have around 8 hours of
power cut daily.
For a
hi,
how do we complete this table
Table shown may be completed to define 'associative'
binary operation * on S={a,b,c,d}. Assume this is
possible and compute the missing entries
*|a|b|c|d
-
a|a|b|c|d
-
b|b|a|c|d
-
c|c|d|c|d
-
d| | | |
Its clear for
helo,
Hilarious, dude. Who got nukes first? India.
Nope US did.
India got after US and before pakistan.Pak claims to
have nukes since 1983,though they were tested only in
1999-his report comes frm pakistan.
See your own propoganda site,
US is not the only counrty who can do that :-)
hi,
yes-thats probabaly why they nuked hirsoshima and
nagasaki.
Dont undermine the hate.There was no logic
either.There was no logic in nuking thousand of people
in hirsohma saying their existance is less important
to thousands of people who might live,if the city was
nuked.
Sarath.
hi,
Why are the suicide bombers after US troops-its the
hate.It does work .Yesterday at najaf(iraq)-a family
of 8 women and atleast 2 children were killed by
allied troops.They claimed that the vehicle sped
towards an allied check post.So they fired warning
shots to *stop* the vehicle.
When it
--- Damian Gerow [EMAIL PROTECTED] wrote:
And then the whole world dies, because of ... what?
Seriously, I *highly* doubt that any nation at this
time would *seriously*
think of bombing another nuclear-enabled nation with
a nuclear weapon. It's
just suicide.
Well-pakistan has been
hi,
Blitz comes with high casualities.Shock and awe
technique can use troops paratrooping into baghdad.But
casualities are always unacceptable to the U.S. So
they do it the conventional way.
Sarath.
--- Ken Brown [EMAIL PROTECTED] wrote:
Tyler Durden wrote:
[...]
PS: Anyone notice the
hi,
on the first or second day of the war-iraqi missiles
hit kuwait-4 to 5 of them.
After that there is no word of any more strikes in
kuwait or else where.What is Iraq waiting for?
Regards Sarath.
__
Do you Yahoo!?
Yahoo! Platinum - Watch CBS'
helo,
--- John Kelsey [EMAIL PROTECTED] wrote:
Be fair about this. We own the skies above Baghdad,
bit too much, but it's not like we're targeting
civilian areas. If we
were, the images from Baghdad would be very
different; not just one market
with a bomb crater, and one hospital
hi,
That cannot possibly even happen-by mistake.Al-jazeera
is qatar based.They might hit a chinese embassy but
not AL-Jazeera.
1500 turkish troops moved into north iraq-US cannot
immediately do any thing about it since flying over
Turkish air space is important for them.
Sarath.
(Before Al
hi,
All this happening on the worlds greatest demcoracy.
may be you read this news.
http://news.yahoo.com/fc?tmpl=fccid=34in=techcat=hackers_and_crackers
Unofficial reports are that 500 iraqi's died 2 days
ago and day before yesterday another 1000 died.This
is the word comming from Saudi-from
hi,
well here is the news on death of iraqi civilians in
basra.
http://story.news.yahoo.com/news?tmpl=storyu=/ap/20030328/ap_on_re_mi_ea/war_basracid=716ncid=716
I think the reverse is true.After the 'desert rats'
were forced out of basra-the iraqi's were using anti
air craft guns on US
hi,
Need help on understanding the following marix
multiplication.
let _ denote subscript.
w=32 bits(0 to 31)
let X be a 32 bit vector
X={X_(w -1),x_(w-2),..x_0}
A=
|1 0 . .|
|0 .|
|. . |
|. .|
|a_(w-1)
hi,
it doesnt matter as long as Al-Jazeera is live and
kicking and the camera's are rolling.
The highly classified bomb creates a brief pulse of
microwaves powerful enough to fry computers, blind
radar, silence radios, trigger crippling power
outages and disable the electronic ignitions in
hi,
They are not working very well or US since the iraqi's
are using gps jammers and US are already in a row with
russians claiming that they sold it to iraq.
Regards Sarath.
--- Tim May [EMAIL PROTECTED] wrote:
On Tuesday, March 25, 2003, at 03:30 AM, Ken Brown
wrote:
Declan McCullagh
hi,
Terrorism only increases.Saying meet fire with fire is
only an anology.The whole world is against the war but
they are all oppurtunists-they will strike only when
they can.The war may do more damage even than all the
oil it can get.
Regards Sarath.
--- Mike Rosing [EMAIL PROTECTED] wrote:
hi,
Every one is a suspect-Let me check all your
pockets.Stand in the line syria,egypt,iran,korea!
Whats happening with this world.
Sarath.
--- Tyler Durden [EMAIL PROTECTED] wrote:
As the Iraqis themselves said, and I paraphrase
(because the quote is not
handy): If the U.S. says they
hi,
Starting a war with saudi is a simple thing.How ever
unless they don't find enough oil in iraq,they will
turn onto KSA.
How ever Saudi with Mecca and Madina is a dangerous
country to attack.Saudi will surely take it as a war
on muslims and the impact of that is severe.Saudi is
the holy
hi,
how long does US analysts expect iraq to be completely
occupied by US and allied troops?
Regards Sarath.
__
Do you Yahoo!?
Yahoo! Platinum - Watch CBS' NCAA March Madness, live on your desktop!
http://platinum.yahoo.com
hi,
You probably know this if you use it, but
/dev/random is the most
random one, as it always uses system entropy,
rather than falling
back on an algorithm to generate more bits than are
available in
the pool.
Its always better to choose an algorithm because it
has *known*
hi,
I've not followed it closely, but Powell claims to
have a tape of
Bin Laden talking to Iraqi's. Al Jazerra denys
it's real. This is
all from NPR. The game is afoot, let's see who can
deliver the bigger
lie.
A tape as an evidence?Is a tape still considered as a
valid piece of
hi,
Would countries with an advanced space program and
with capilities of launching satellites have ICBM
capabilities.if yes can they be sucessfully launched
with the knowledge that they can successfully launch
medium range missiles (2000 to 3000 km range).
Regards Sarath.
iraq can come up with.
Regards Sarath.
--- Mike Rosing [EMAIL PROTECTED] wrote:
On Thu, 16 Jan 2003, Sarad AV wrote:
There is a new oil pipe line being completed
through
turkey-caspian sea.once thats over the war should
start.
Russia will never give US its support-the russians
hi,
Iraqi high ranking officers had the oppurtunity to
defect in the 1991 war too.
By the way how many of these officers who go for
battle ever check e-mail.
--- Major Variola (ret) [EMAIL PROTECTED] wrote:
radio broadcasts and leaflets
dropped from airplanes
instead. .
hi,
So where does that put privacy to.Your whole life
outside the house can be monitered-when there are many
cameras.
May be the worlds air getting polluted isn't so
bad-atleast we could put anti-pollution masks and
protect our identity :)
Regards Sarath.
--- Eugen Leitl [EMAIL PROTECTED]
hi,
Then, if any two or more axioms of an
alleged mathematical
theory are found to be inconsistent with each
other,
the whole theory
collapses.
there will be no inconsistency in a formal axiomatic
systems-but can any one point me to a contradicting
set of axioms in an axiomatic
observe and not what we speculate-so may be there is
no point in speculating since we only end up with same
questions and our understanding gets no better than it
was.
Regards Sarath.
--- Bill Stewart [EMAIL PROTECTED] wrote:
At 12:39 AM 01/04/2003 -0800, Sarad AV wrote:
There has been much
every other paradox?
Regards Sarath.
--- Mike Rosing [EMAIL PROTECTED] wrote:
On Fri, 3 Jan 2003, Sarad AV wrote:
As it says-they are self referecial
statements.What do
we learn from the liars paradox?
We arrive at a senseless result-doesn't all other
paradoxes do
hi,
--- Jim Choate [EMAIL PROTECTED] wrote:
On Fri, 3 Jan 2003, Sarad AV wrote:
As you already see-what you say is correct for
your
definition of proof and axiom.
Here is the fundamental error in your thinking, you
are trying to argue
apples and oranges.
how do you know
hi,
--- Jim Choate [EMAIL PROTECTED] wrote:
On Thu, 2 Jan 2003, Sarad AV wrote:
An axiom is an improvable statement which is
accepted
as true.
An axiom is a statement which is -assumed to be
universaly required-.
That is -not- equivalent to 'true' (eg A point has
only position
hi,
with reference to
http://www.utm.edu/research/iep/p/par-liar.htm
it says
The Liar Paradox is an argument that arrives at a
contradiction by reasoning about a Liar Sentence. The
most familiar Liar Sentence is the following
self-referential sentence:
(1) This sentence is false.
Experts
hi,
--- Jim Choate [EMAIL PROTECTED] wrote:
On Tue, 31 Dec 2002, Sarad AV wrote:
Does a paradox ever help in understanding any
thing?
Yes, it can demonstrate that you aren't asking the
right questions within
the correct context.
okay.
2.Gödel asks for the program
hi,
A few queries.
Does a paradox ever help in understanding any thing?
We define a paradox on a base of rules we want to
prove.
Ok,let me pick an example.
We make a paradox over a statement.
This i found on the net
The following is an implication that the Oracle does
not exist.
hi,
Thank you for the reply.
they didn't really explain why; I think it was
leftover
regulations from wartime censorship during World War
II
or the Korean Police Action.
I think so.
Also, in the US, the police can request a mail
cover
(which means recording who all your snail mail
--- Tim May [EMAIL PROTECTED] wrote:
Arise the masses,how he did that-I have no
clue.How
ever he did that in the 1940's when the only
method of
mass communication was radio(british controlled)
and
new paper(again british controlled).To bring
together
a
hi,
Nothing serious, just throwing a quick thought out...
It has been mentioned that you should always use
crypto. If you wait
until
you actually have something private to send, then an
adversary will
know
exactly which message is important.
Don't encrypt,post it by snail mail.I remember
hi,
Be the change you wish to see in the world
-Mahatma Gandhi
So how we gonna change the world dude?
Arise the masses,how he did that-I have no clue.How
ever he did that in the 1940's when the only method of
mass communication was radio(british controlled) and
new paper(again british
hi,
--- James A. Donald [EMAIL PROTECTED] wrote:
US policy was to restore the status quo ante in
Afghanistan,
put things back the way they were before the Soviet
invasion.
How does that make things better for 'afghan'
people,after all the bombing done on their home land?
The future
of
hi,
Mr. Scheiner was always a bozo,
If he is such a bozo,why are n't many of those saying
this not as sucessful as he is?
Mr. Sheiner's book on applied cryptography is a beauty
for a beginer.
--- Sleeping Vayu [EMAIL PROTECTED] wrote:
Mr. Scheiner was always a bozo, for those who
will be back.
Regards Sarath.
On Fri, 13 Dec 2002, Sarad AV wrote:
The Taliban is still very much alive,when troops
moved
into kabul there were no traces of the
taliban.They
took what ever they wanted and were 'refugees'
sneaking out when the bombing started.They placed
what
hi,
All represive regiemes are short lived in a
historical context.
The Taliban is still very much alive,when troops moved
into kabul there were no traces of the taliban.They
took what ever they wanted and were 'refugees'
sneaking out when the bombing started.They placed what
they needed ,every
hi,
Thanks for the replies,a few more queries.
Complete means that we can take any and all -legal-
strings within that
formalism and assign them -one of only two- truth
values; True v False.
The fundamental problem is axiomatic. The rules
define -all- statements as
being -either true or
hi,
But there's a hitch: When WPA detects a break-in
attempt, it shuts down the network for a minute and
then restarts. During that time, legitimate users are
off the air too.
Unauthorised access can be taken off by setting fake
access points as such,whats the need for shutting down
the
hi,
I had suggested the same for an encryption product
called digisecret,this is what they had to say.
Here is an example where hiding cipher text in cipher
text is ideal..
DigiSecret currently does not use assymmetric
algorithms. Besides this
the introduction of this technique will mean that
hi,
Does any one have a reference to the actual paper-
Random Numbers Fall Mainly in the Planes. Proceedings
of the National Academy of Science (USA) 61
(September): 25-28
Thank You.
Regards Sarath.
__
Do you Yahoo!?
Y! Web Hosting - Let the
hi,
For the output produced by ever non-linear shift feed
back register does there exist a minimum period linear
shift register that can mimic the output of a non
linear shift feed back register?If yes,how do we find
out the tap sequence of the minimum period LSFR which
represents the non
hi,
In the book on Applied Cryptography by Bruce
Schenier,it goes like this...
let p(0) be the probability of occurance of 0
and p(1) be the probability od occurance of one.
let
p(0)=0.5+e
p(1)=0.5-e
where e is the bias of the bit towards 0 or 1
ideally e=0 P(0)=P(1)=0.5(no bias
hi,
An extract frm this months cryptogram goes as below.
On the other hand, if you ever find a product that
actually uses a one-time pad, it is almost certainly
unusable and/or insecure.
So, let me summarize. One-time pads are useless for
hi,
The government knows exactly what it's doing. It
wants to discourage the use of encryption by any
means necessary, because of sheer numbers.
Does n't govt intervension always increase the
numbers?
Basically, the more messages that are encypted,
the more hardware (and therefore $$$)
95 matches
Mail list logo