[johnmacsgroup] INTEL: Venona Project
--- begin forwarded text Status: U To: DemocratsConvHall [EMAIL PROTECTED] From: CodeTen7 [EMAIL PROTECTED] Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED] Date: Thu, 26 Jun 2003 23:25:26 -0600 Subject: [johnmacsgroup] INTEL: Venona Project Reply-To: [EMAIL PROTECTED] Venona Project Homepage, NSA National Security Agency ^ | July 1995 (Documents Made Public) Introduction to the VENONA Project An Effort to Digitize and Enhance the VENONA Documents by Mr. William P. Crowell, Former Deputy Director, National Security Agency In July 1995 the Intelligence Community ended a 50-year silence regarding one of cryptology's most splendid successes - the VENONA Project. VENONA was the codename used for the U.S. Signals Intelligence effort to collect and decrypt the text of Soviet KGB and GRU messages from the 1940's. These messages provided extraordinary insight into Soviet attempts to infiltrate the highest levels of the United States Goverment. Today, we are proud to offer these exceptional documents on the NSA home page and we invite you to study and interpret them in the context of history. NSA has declassified over 3000 messages related to VENONA. We believe they will not only provide a window into Soviet espionage during the 1940's, but will also give you a glimpse of the important contributions signals intelligence and cryptographic expertise make to our nation's security. The Link: http://www.nsa.gov/docs/venona/http://www.nsa.gov/docs/venona/ Patriotism is not a short and frenzied outburst of emotion, but the tranquil and steady dedication of a lifetime Yahoo! Groups Sponsor http://rd.yahoo.com/M=251812.3170658.4537139.1261774/D=egroupweb/S=1705060375:HM/A=1564415/R=0/SIG=11t6t7kdo/*http://www.netflix.com/Default?mqso=60164784partid=3170658 To unsubscribe from this group, send an email to: [EMAIL PROTECTED] Your use of Yahoo! Groups is subject to the http://docs.yahoo.com/info/terms/Yahoo! Terms of Service. --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire' - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: Draft Edition of LibTomMath book
Le ven 27/06/2003 à 15:24, Werner Koch a écrit : Does the proprietary SSH still use GMP? I know no other major crypto apps using GMP for big number math. A problem with GMP is that it heavily uses alloca() and thus it is not that hard to find traces of secrets in the core. I know that freeswan use it. Cheers -- Marcel de Riedmatten pgp key: CFE703CA http://ftp.dotforge.ch/pub/users/mdr/mdr.gpg.asc Empreinte: 4687 F9CB D8E2 AC1A B806 F812 C048 0875 CFE7 03CA signature.asc Description: PGP signature
[CYBERIA] HR Block sued over electronic transaction methodpatent
--- begin forwarded text Status: U Thread-Topic: [CYBERIA] Combining Verizon DMCA case with Grokster Thread-Index: AcMU4iXZDMSa+RRWQF2ZUhfFWfqnygAAvxfwAlB7E0AAkYhJYAEs5nrAAGjbCxAAB3Zw8ADDJcDQADTT+2AALZj34AAK9CcQAMC7Y7ADgxgEkA== Date: Fri, 27 Jun 2003 10:02:33 -0400 Reply-To: Law Policy of Computer Communications [EMAIL PROTECTED] Sender: Law Policy of Computer Communications [EMAIL PROTECTED] From: Ebert, Lawrence B. [EMAIL PROTECTED] Subject: [CYBERIA] HR Block sued over electronic transaction method patent To: [EMAIL PROTECTED] Yodlee Inc. has filed suit against HR Block Inc. and its Block Financial Corp. division, claiming infringement of patent claims relating to a method for delivering non-public personal information relating to an end user via a wide-area computer network . The Complaint asserts Block uses technology within the scope of claims of U.S. Patent No. 6,317,783, captioned Apparatus and methods for automated aggregation and delivery of and transactions involving electronic personal information or data, issued November 13, 2001, filed October 27, 1999. [There is a priority claim to a provisional filed Oct. 28,1998). The patent was initially assigned by the inventors Gregg Freishtat and Paliniswamy Rajan to Verticalone Corp. (Atlanta, GA), which merged with Yodlee in December 2000. The text of claim 1 is as follows. 1. A method for delivering non-public personal information relating to an end user via a wide-area computer network to an end user from at least one of a plurality of information providers securely storing the personal information under control of a processor located remotely from the information providers and the end user, the method comprising the steps of: (a) the processor connecting with at least one information provider; (b) for a selected end user, the processor retrieving personal information for the selected end user from the connected at least one information provider based on end user data associated with the selected end user and information provider data associated with the connected one or more information providers, the end user data including information identifying the plurality of information providers securely storing the personal information relating to the end user, the provider data including a protocol for instructing the processor how to access the securely stored personal information via the network, the information accessible to the processor using the protocol also being accessible by the end user via the network independently of the system for delivering personal information; and (c) the processor storing the retrieved personal information in a personal information store for access by the selected end user. Lawrence B. Ebert June 27, 2003 at 10:02am This message is sent in confidence for the addressee only. It may contain legally privileged information. The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients are requested to preserve this confidentiality and to advise us of any errors in transmission. Thank you. ** For Listserv Instructions, see http://www.lawlists.net/cyberia Off-Topic threads: http://www.lawlists.net/mailman/listinfo/cyberia-ot Need more help? Send mail to: [EMAIL PROTECTED] ** --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire' - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: pubkeys for p and g
martin f krafft wrote: also sprach Peter Fairbrother [EMAIL PROTECTED] [2003.06.27.1903 +0200]: Can you give me a ref to where they say that? I'd like to know exactly what they are claiming. this will have to wait a couple of days. Perhaps they are encrypting the DH secrets with RSA keys to provide some recipient authentication? nope. Or perhaps they are using DH instead of RSA for their public keys? nope. Hmmm. It's not exactly DH, but if you used the e of a RSA key as g, and the N as p, that would actually work. It's only one RSA key tho'. -- Peter Fairbrother - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
New NTRUEncrypt Parameters
(I've also posted this message to sci.crypt) Hi list, NTRU Cryptosystems has posted several new documents, which are avaible through http://www.ntru.com/cryptolab/params.htm. As background: recent results on NTRUEncrypt have shown that decryption failures on validly encrypted messages leak information that eventually allows an attacker to recover the private key. The results do not affect the known difficulty of the underlying class of lattice problems; however, they show that care must be taken in choosing parameters to ensure that decryption failures occur with negligible or zero probability, even in the presence of an adversary who is actively trying to cause such failures. NTRU Cryptosystems is proposing slightly altered parameter sets which decrease the probability of average-case decryption failures, and a padding scheme which ensures that an attacker cannot increase the probability of decryption failures above this average-case probability. The new documents analyze the strength of the new parameter sets against all known attacks on NTRU (lattice-based, meet-in-the- middle, and decryption failure based) and show that for N=251 we comfortably achieve 2^80 security against all of these attacks. We also provide the first ever full proof of security to be presented for NTRUEncrypt. If anyone has any questions, I'll be happy to answer them. Cheers, William === William Whyte Director, Cryptographic RD NTRU Cryptosystems 5 Burlington Woods Burlington, MA 01803 tel: +1.781.418.2500 fax: +1.781.418.2532 - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: pubkeys for p and g
martin f krafft writes: My point was that some commercial vendors (Check Point and others) claim, that if two partners want to perform a DH key exchange, they may use their two public keys for g and p. This, in effect, would mean that g and p were not globally known, but that the public keys are used in their place. ... We are writing a book and simply want to have some backup. I am almost sure that Check Point is bullshitting (wouldn't be the first time), so unless anyone has actually heard of this possibility, I am going to write this down and influence a thousand people, basically claiming that Check Point is wrong. Do you have a reference to what exactly Check Point says about this? Maybe you are misunderstanding or misinterpreting them. If you could quote it here verbatim (or provide a link if it is online) we might be able to understand their claim better. It would be wise to make sure it is not a simple misunderstanding before you put something critical about them in your book. - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Feedback from the LibTomMath Book?
Close to 100 people have downloaded the book so far [which is alot given the nature of the book] and although it has only been two days I was wondering if anyone has any initial impressions [good or bad]. I'm going to start the editing phase of the text fairly soon so I'd like to know what people thought of it before I got started. I won't repost the url since I don't want to spam the list [if you want it just email me in private]. Thanks, Tom __ Do you Yahoo!? SBC Yahoo! DSL - Now only $29.95 per month! http://sbc.yahoo.com - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]