-Caveat Lector- In a message dated 3/22/99 10:17:06 PM Eastern Standard Time, [EMAIL PROTECTED] writes: > Subj: [CTRL] EnCRyPtiON: more than just complex algori > Date: 3/22/99 10:17:06 PM Eastern Standard Time > From: [EMAIL PROTECTED] (Kris Millegan) > Sender: [EMAIL PROTECTED] (Conspiracy Theory Research List) > Reply-to: [EMAIL PROTECTED] (Conspiracy Theory Research List) > To: [EMAIL PROTECTED] > > File: CTRLEnCR.txt (39951 bytes) > DL Time (26400 bps): < 1 minute > > [Only the first part of this message is displayed. The entire message has > been turned into a text attachment, which you can retrieve by selecting > Download. Once downloaded, open it with a word processor or text editor for > reading.] > > -Caveat Lector- > > from: > http://www.ednmag.com/reg/1999/031899/06df2.cfm > <A HREF="http://www.ednmag.com/reg/1999/031899/06df2.cfm">03.18.99� > EnCRyPtiON: More than just complex al </A> > ----- > > > > EnCRyPtiON: more than just complex algorithms > > Much of the information available on encryption focuses on the math > behind transforming data or creating keys. Encryption, however, is only > one part of a comprehensive protection scheme. Just as important as a > strong algorithm is a secure implementation of that algorithm. > > Nicholas Cravotta, Technical Editor > > > > Sufficient security is a balance of price, performance, and privacy. > > An application may require several encryption algorithms working > together to guarantee data integrity and authenticity. > > Encryption technology is available as software, ICs, or embedded cores. > > Biometrics and tokens, such as smart cards, protect keys from misuse and > unauthorized copying. > > The more complex the system, the more vulnerable it is to attack. > "Randomness" is next to "secretness" > Exporting encryption technologies > > Other encryption techniques > > For more information > > The rise of digital technology has changed the way people use and store > information. As more and more data takes a digital form�shifting from > physical media, such as film, tape, or paper, to bits�the need to > protect both the content and the privacy of information has increased. > For example, music and video copied from a digital versatile disk (DVD) > results in a perfect copy, a factor that has held up the adoption of DVD > because studios are afraid to leave their valuable content so vulnerable > to theft. > > Encryption technology plays an important role in maintaining the general > avaey can read encrypted data. > An electronic cracker trying to break an algorithm with a 56-bit key > needs to try random keys from a key space of 256 keys. Depending on the > speed of the processors that crackers use, cracking can take hours to > centuries. In general, EXACTLY Right!!!! Dr. E. DECLARATION & DISCLAIMER ========== CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substance�not soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
