[johnmacsgroup] INTEL: Venona Project

2003-06-27 Thread R. A. Hettinga

--- begin forwarded text


Status:  U
To: DemocratsConvHall [EMAIL PROTECTED]
From: CodeTen7 [EMAIL PROTECTED]
Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED]
Date: Thu, 26 Jun 2003 23:25:26 -0600
Subject: [johnmacsgroup] INTEL: Venona Project
Reply-To: [EMAIL PROTECTED]



Venona Project Homepage, NSA
  National Security Agency ^  | July 1995 (Documents Made Public)


Introduction to the VENONA Project
An Effort to Digitize and Enhance the VENONA Documents
by Mr. William P. Crowell, Former Deputy Director, National Security
Agency

In July 1995 the Intelligence Community ended a 50-year silence
regarding one of cryptology's most splendid successes - the VENONA
Project. VENONA was the codename used for the U.S. Signals Intelligence
effort to collect and decrypt the text of Soviet KGB and GRU messages
from the 1940's. These messages provided extraordinary insight into
Soviet attempts to infiltrate the highest levels of the United States
Goverment.
  Today, we are proud to offer these exceptional documents on the NSA
home page and we invite you to study and interpret them in the context
of history. NSA has declassified over 3000 messages related to VENONA.
We believe they will not only provide a window into Soviet espionage
during the 1940's, but will also give you a glimpse of the important
contributions signals intelligence and cryptographic expertise make to
our nation's security.


The Link:
http://www.nsa.gov/docs/venona/http://www.nsa.gov/docs/venona/


 Patriotism is not a short and frenzied outburst of emotion, but the tranquil and 
steady dedication of a lifetime

Yahoo! Groups Sponsor 
http://rd.yahoo.com/M=251812.3170658.4537139.1261774/D=egroupweb/S=1705060375:HM/A=1564415/R=0/SIG=11t6t7kdo/*http://www.netflix.com/Default?mqso=60164784partid=3170658

To unsubscribe from this group, send an email to:
[EMAIL PROTECTED]



Your use of Yahoo! Groups is subject to the http://docs.yahoo.com/info/terms/Yahoo! 
Terms of Service.

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Draft Edition of LibTomMath book

2003-06-27 Thread Marcel de Riedmatten
Le ven 27/06/2003 à 15:24, Werner Koch a écrit :

 Does the proprietary SSH still use GMP?  I know no other major crypto
 apps using GMP for big number math.  A problem with GMP is that it
 heavily uses alloca() and thus it is not that hard to find traces of
 secrets in the core.

I know that freeswan use it. 

Cheers

-- 
Marcel de Riedmatten
pgp key: CFE703CA http://ftp.dotforge.ch/pub/users/mdr/mdr.gpg.asc
Empreinte: 4687 F9CB D8E2 AC1A B806  F812 C048 0875 CFE7 03CA


signature.asc
Description: PGP signature


[CYBERIA] HR Block sued over electronic transaction methodpatent

2003-06-27 Thread R. A. Hettinga

--- begin forwarded text


Status:  U
Thread-Topic: [CYBERIA] Combining Verizon DMCA case with Grokster
Thread-Index: 
AcMU4iXZDMSa+RRWQF2ZUhfFWfqnygAAvxfwAlB7E0AAkYhJYAEs5nrAAGjbCxAAB3Zw8ADDJcDQADTT+2AALZj34AAK9CcQAMC7Y7ADgxgEkA==
Date: Fri, 27 Jun 2003 10:02:33 -0400
Reply-To: Law  Policy of Computer Communications  [EMAIL PROTECTED]
Sender:   Law  Policy of Computer Communications  [EMAIL PROTECTED]
From: Ebert, Lawrence B. [EMAIL PROTECTED]
Subject: [CYBERIA] HR Block sued over electronic transaction method patent
To:   [EMAIL PROTECTED]

Yodlee Inc. has filed suit against HR Block Inc. and its Block
Financial Corp. division, claiming infringement of patent claims
relating to a method for delivering non-public personal information
relating to an end user via a wide-area computer network . The
Complaint asserts Block uses technology within the scope of claims of
U.S. Patent No. 6,317,783, captioned Apparatus and methods for
automated aggregation and delivery of and transactions involving
electronic personal information or data, issued November 13, 2001,
filed October 27, 1999. [There is a priority claim to a provisional
filed Oct. 28,1998).

The patent was initially assigned by the inventors Gregg Freishtat and
Paliniswamy Rajan to Verticalone Corp. (Atlanta, GA), which merged
with Yodlee in December 2000.

The text of claim 1 is as follows.

1. A method for delivering non-public personal information relating to
   an end user via a wide-area computer network to an end user from at
   least one of a plurality of information providers securely storing
   the personal information under control of a processor located
   remotely from the information providers and the end user, the
   method comprising the steps of:

(a) the processor connecting with at least one information provider;

(b) for a selected end user, the processor retrieving personal
information for the selected end user from the connected at least
one information provider based on end user data associated with
the selected end user and information provider data associated
with the connected one or more information providers, the end user
data including information identifying the plurality of
information providers securely storing the personal information
relating to the end user, the provider data including a protocol
for instructing the processor how to access the securely stored
personal information via the network, the information accessible
to the processor using the protocol also being accessible by the
end user via the network independently of the system for
delivering personal information; and 

(c) the processor storing the retrieved personal information in a
personal information store for access by the selected end user. 


Lawrence B. Ebert
June 27, 2003 at 10:02am



This message is sent in confidence for the addressee only. It may
contain legally privileged information. The contents are not to be
disclosed to anyone other than the addressee. Unauthorised
recipients are requested to preserve this confidentiality and to
advise us of any errors in transmission. Thank you.



**
For Listserv Instructions, see http://www.lawlists.net/cyberia
Off-Topic threads: http://www.lawlists.net/mailman/listinfo/cyberia-ot
Need more help? Send mail to: [EMAIL PROTECTED]
**

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: pubkeys for p and g

2003-06-27 Thread Peter Fairbrother
martin f krafft wrote:

 also sprach Peter Fairbrother [EMAIL PROTECTED] [2003.06.27.1903 +0200]:
 Can you give me a ref to where they say that? I'd like to know
 exactly what they are claiming.
 
 this will have to wait a couple of days.
 
 Perhaps they are encrypting the DH secrets with RSA keys to provide some
 recipient authentication?
 
 nope.
 
 Or perhaps they are using DH instead of RSA for their public keys?
 
 nope.

Hmmm.

It's not exactly DH, but if you used the e of a RSA key as g, and the N as
p, that would actually work. It's only one RSA key tho'.


-- 
Peter Fairbrother


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


New NTRUEncrypt Parameters

2003-06-27 Thread Whyte, William
(I've also posted this message to sci.crypt)

Hi list,

NTRU Cryptosystems has posted several new documents, which are
avaible through http://www.ntru.com/cryptolab/params.htm.

As background: recent results on NTRUEncrypt have shown that
decryption failures on validly encrypted messages leak information
that eventually allows an attacker to recover the private key.
The results do not affect the known difficulty of the underlying
class of lattice problems; however, they show that care must
be taken in choosing parameters to ensure that decryption failures
occur with negligible or zero probability, even in the presence
of an adversary who is actively trying to cause such failures.

NTRU Cryptosystems is proposing slightly altered parameter sets
which decrease the probability of average-case decryption failures, 
and a padding scheme which ensures that an attacker cannot increase
the probability of decryption failures above this average-case
probability.

The new documents analyze the strength of the new parameter sets
against all known attacks on NTRU (lattice-based, meet-in-the-
middle, and decryption failure based) and show that for N=251
we comfortably achieve 2^80 security against all of these attacks.
We also provide the first ever full proof of security to be presented
for NTRUEncrypt.

If anyone has any questions, I'll be happy to answer them.

Cheers,

William


===
William Whyte
Director, Cryptographic RD
NTRU Cryptosystems
5 Burlington Woods
Burlington, MA 01803
tel:  +1.781.418.2500
fax:  +1.781.418.2532

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: pubkeys for p and g

2003-06-27 Thread Nomen Nescio
martin f krafft writes:
 My point was that some commercial vendors (Check Point and others)
 claim, that if two partners want to perform a DH key exchange, they
 may use their two public keys for g and p. This, in effect, would
 mean that g and p were not globally known, but that the public keys
 are used in their place.
 ...
 We are writing a book and simply want to have some backup. I am
 almost sure that Check Point is bullshitting (wouldn't be the first
 time), so unless anyone has actually heard of this possibility, I am
 going to write this down and influence a thousand people, basically
 claiming that Check Point is wrong.

Do you have a reference to what exactly Check Point says about this?
Maybe you are misunderstanding or misinterpreting them.  If you could
quote it here verbatim (or provide a link if it is online) we might be
able to understand their claim better.  It would be wise to make sure
it is not a simple misunderstanding before you put something critical
about them in your book.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Feedback from the LibTomMath Book?

2003-06-27 Thread tom st denis
Close to 100 people have downloaded the book so far [which is alot
given the nature of the book] and although it has only been two days I
was wondering if anyone has any initial impressions [good or bad].

I'm going to start the editing phase of the text fairly soon so I'd
like to know what people thought of it before I got started.

I won't repost the url since I don't want to spam the list [if you
want it just email me in private].

Thanks,
Tom

__
Do you Yahoo!?
SBC Yahoo! DSL - Now only $29.95 per month!
http://sbc.yahoo.com

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]