Re: Crypto hardware

2001-07-12 Thread R. A. Hettinga

At 2:28 PM -0700 on 7/10/01, Kent Crispin wrote:


 Does this description trigger any recollection?  Are there similar
 devices on the market from other sources?

Yup. Talk to NCipher. http://www.ncipher.com

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



RE: Crypto hardware

2001-07-12 Thread John P. Sullivan

You are describing a Hardware Security Module (HSM) and there are several on
the market from various vendors.

For further data on our product line please feel free to look at our
website.  Our nShield product is FIPS 140-1 Level 3 validated:
http://www.ncipher.com/products/nshield/index.html

HTH,

--John

John P. Sullivan
Senior Consulting Engineer
nCipher, Inc.
781-994-4084 (office)
[EMAIL PROTECTED]

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED]]On Behalf Of Kent Crispin
 Sent: Tuesday, July 10, 2001 5:28 PM
 To: [EMAIL PROTECTED]
 Subject: Crypto hardware


 A couple of years ago at the RSA conference one of the vendors was
 exhibiting a tamperproof that would keep a secret key and perform
 encryptions/signatures using the key.  Since the key never left the
 box, in theory security reduced to physical security around the box.
 The intended use of the box was as a master for a CA.  I thought the
 vendor was GTE, but I didn't find anything definitive on their site.

 Does this description trigger any recollection?  Are there similar
 devices on the market from other sources?

 --
 Kent Crispin   Be good, and you will be
 [EMAIL PROTECTED]   lonesome. -- Mark Twain



 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to
 [EMAIL PROTECTED]




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Crypto hardware

2001-07-12 Thread Eric Murray

On Tue, Jul 10, 2001 at 02:28:08PM -0700, Kent Crispin wrote:
 A couple of years ago at the RSA conference one of the vendors was 
 exhibiting a tamperproof that would keep a secret key and perform 
 encryptions/signatures using the key.  Since the key never left the 
 box, in theory security reduced to physical security around the box.  
 The intended use of the box was as a master for a CA.  I thought the 
 vendor was GTE, but I didn't find anything definitive on their site.
 
 Does this description trigger any recollection?  Are there similar 
 devices on the market from other sources?

Was it the BBN Safekeeper?
I haven't seen one, but I have had it described
to me as a PC welded into a box, intended for
use as a CA.

Eric



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Navajo Code Talkers

2001-07-12 Thread William Allen Simpson

H. CON. RES. 174

Authorizing the Rotunda of the Capitol to be used on July 26, 2001, for 
a ceremony to present Congressional Gold Medals to the original 29
Navajo Code Talkers. 
-- 
William Allen Simpson
Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Crypto hardware

2001-07-12 Thread David Honig

At 02:28 PM 7/10/01 -0700, Kent Crispin wrote:
A couple of years ago at the RSA conference one of the vendors was 
exhibiting a tamperproof that would keep a secret key and perform 
encryptions/signatures using the key.  Since the key never left the 
box, in theory security reduced to physical security around the box.  
The intended use of the box was as a master for a CA.  I thought the 
vendor was GTE, but I didn't find anything definitive on their site.

Does this description trigger any recollection?  Are there similar 
devices on the market from other sources?


Look up ibutton.com


 






  







-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: FW: Zero-Knowledge proofs for valid decryption !!

2001-07-12 Thread Emmanouil Magkos

The background of my question was an auction application where encrypted
bids are published on a bulletin board. All bids are authenticated, i.e.
signed by the bidders. Since there is no anonymity, (there are reasons for
this), the link between the encrypted bids and the decrypted results, which
will be published for verifiability, must be hidden. Note that in electronic
voting, which is a similar application to auctions, the homorphism of the
encryption scheme may allow an observer to gather the encrypted results,
and then only verify the sum of encrypted votes. However, in an auction
application, this is not the case. So there is a need for the Auctioneers
(they are distributed, for bid-secrecy) to publish a shuffle of the
decrypted bids, and then prove correctness of the decryption in
zero-knowledge.

Although I have read a few papers about mix-nets (in the e-voting context),
I had not realized that the mix idea answered my question (although I should
have :). Thanx for all folks who answered my question !!


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Crypto hardware

2001-07-12 Thread Derek Atkins

Are you talking about the BBN/GTE SafeKeyPer (I may have mis-spelled
that)?  I don't know if they are still on the market -- they were
priced Really High.

-derek

Kent Crispin [EMAIL PROTECTED] writes:

 A couple of years ago at the RSA conference one of the vendors was 
 exhibiting a tamperproof that would keep a secret key and perform 
 encryptions/signatures using the key.  Since the key never left the 
 box, in theory security reduced to physical security around the box.  
 The intended use of the box was as a master for a CA.  I thought the 
 vendor was GTE, but I didn't find anything definitive on their site.
 
 Does this description trigger any recollection?  Are there similar 
 devices on the market from other sources?
 
 -- 
 Kent Crispin   Be good, and you will be
 [EMAIL PROTECTED]   lonesome. -- Mark Twain
 
 
 
 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

-- 
   Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
   Member, MIT Student Information Processing Board  (SIPB)
   URL: http://web.mit.edu/warlord/PP-ASEL-IA N1NWH
   [EMAIL PROTECTED]PGP key available



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Crypto hardware

2001-07-12 Thread Greg Troxel

This sounds like the BBN Safekeyper.  (BBN was acquired by GTE, but
still operates using the BBN name.)

A similar device is described at:

  http://www.bbn.com/infosec/signassure.html



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



RE: Crypto hardware

2001-07-12 Thread John Lowry

The unit is called the SafeKeyper from BBN. It is based on 
a unit designed for type-1 cryptography and met
the various government standards required.  That 
unit was, I believe, the first cryptographic peripheral device
accepted by the government and led to the acceptance of other 
peripheral cryptographic devices like Fortezza, SmartCards, etc.

We in the biz never use the term tamperproof  ;-)
Besides being impossible, it is often viewed as a challenge.
Highly tamper resistant and tamper evident is the claim.
For example, we speculate that if you took a
SafeKeyper and froze it in liquid nitrogen, then
you might be able to disassemble it and neutralize
the tamper circuitry.  This would allow you to extract
the keying material and perhaps re-assemble the unit.
We believe that the tampering would be evident due to
tamper resistant seals on the opening of the unit although
cleverness would probably defeat those too.  Of course, if
freezing damaged the circuitry then that would be tamper
evidence too ...  It would be a fun experiment.

We can take this offline if you wish.  I'm not certain
it is of general interest.

BTW: you can still buy these and an improved model
is in the works. 


John Lowry

-
John Lowry
Division Engineer
BBN/Verizon
617-873-2435
[EMAIL PROTECTED]
[EMAIL PROTECTED] 
 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED]]On Behalf Of Kent Crispin
 Sent: Tuesday, July 10, 2001 5:28 PM
 To: [EMAIL PROTECTED]
 Subject: Crypto hardware
 
 
 A couple of years ago at the RSA conference one of the vendors was 
 exhibiting a tamperproof that would keep a secret key and perform 
 encryptions/signatures using the key.  Since the key never left the 
 box, in theory security reduced to physical security around the box.  
 The intended use of the box was as a master for a CA.  I thought the 
 vendor was GTE, but I didn't find anything definitive on their site.
 
 Does this description trigger any recollection?  Are there similar 
 devices on the market from other sources?
 
 -- 
 Kent Crispin   Be good, and you will be
 [EMAIL PROTECTED]   lonesome. -- Mark Twain
 
 
 
 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to 
 [EMAIL PROTECTED]



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



DCSB: David Birch; European Wireless E-Commerce

2001-07-12 Thread R. A. Hettinga


--- begin forwarded text


Date: Wed, 11 Jul 2001 11:44:45 -0400
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
From: R. A. Hettinga [EMAIL PROTECTED]
Subject: DCSB: David Birch; European Wireless E-Commerce
Cc: Dave Birch [EMAIL PROTECTED], Arnold G. Reinhold [EMAIL PROTECTED],
Jean Camp [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Reply-To: R. A. Hettinga [EMAIL PROTECTED]

-BEGIN PGP SIGNED MESSAGE-

[The Harvard Club is now business casual. No more jackets and ties,
but see below for details. While it lasts, anyway. Since last year's
dot-bomb, the suit-ratio in the main dining room has been
asymptotically approaching unity. :-). --RAH]



 The Digital Commerce Society of Boston

  Presents

  David G.W. Birch,
 Director, Consult Hyperion

M-Commerce and Wireless E-Commerce:
  A European Perspective


   Tuesday, August 7th, 2001
 12 - 2 PM
 The Downtown Harvard Club of Boston
One Federal Street, Boston, MA


Getting from the general view that m-commerce will be huge to the
specifics of which business models will come to dominate the sector
is difficult. First, no one knows anything about mobile data and so
we have little to go on to make predictions. Second, the speed and
unpredictability of technological evolution make it hard to stabilise
the platform for services (especially when comparing North American
wireless e-commerce with European m-commerce efforts). Third, there
are legal, political and social issues yet to be resolved.

Yet there have been some successes, and it is worth looking at them
to try and understand the dynamics behind them. What are the real
lessons to be learned from Japan's iMode? Why is business moving in
on the text messaging boom? Is good old e-mail turning out to be the
killer app? To what extent does the SIM shape the future? Does the
French micropayments launch change anything? Do Australian Coca-Cola
machines provide a window on the future or a diversion? Who will
benefit most from E911 and the introduction of location-based
services (my tip: lawyers).

This presentation attempts an overview of these issues, against the
backdrop of the 3G transition, and combines it with experience gained
advising leaders in the m-commerce field to try and make some
sensible predictions about the direction of the m-commerce sector.


David G.W. Birch is a Director of Consult Hyperion, one of the UK's
leading e-commerce consultancies, which he helped found after several
years working as a consultant in Europe, the Far East and North
America. Their clients -- ranging from Mastercard and Microsoft to
Orange and NTT Data -- are working at the leading edge of commerce on
line.

A physicist by training, Dave has lectured on the impact of new
communications technologies to MBA level. He has been on the
editorial board of the Financial Times Virtual Finance Report and
Microsoft's Finance on Windows, as well as the editorial advisory
board for European Business Review. He chaired the Centre for the
Study of Financial Innovation's first working group on the Internet
and Retail Banking and is the moderator of First Tuesday's Wireless
Wednesday resource for mobile entrepreneurs. He has written for
publications ranging from The Guardian to the Parliamentary IT Review
and is a media commentator on electronic commerce issues. He is the
author, with payment systems consultant Mike Hendry, of last year's
Informa report Retail  Consumer Payments in Europe and North
America.


This meeting of the Digital Commerce Society of Boston will be held
on Tuesday, August 7th, 2001, from 12pm - 2pm at the Downtown Branch
of the Harvard Club of Boston, on One Federal Street. The price for
lunch is $37.50. This price includes lunch, room rental, A/V hardware
if necessary, and the speakers' lunch. The Harvard Club has relaxed
its dress code, which is now business casual, meaning no sneakers
or jeans. Fair warning: since we purchase these luncheons in advance,
we will be unable to refund the price of your meal if the Club finds
you in violation of what's left of its dress code.


We need to receive a company check, or money order, (or, if we
*really* know you, a personal check) payable to The Harvard Club of
Boston, by Saturday, August 4th, or you won't be on the list for
lunch. Checks payable to anyone else but The Harvard Club of Boston
will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to The
Harvard Club of Boston, in the amount of $37.50. Please include your
e-mail address so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements
(we've had to work with glacial A/P departments more than once, for
instance), please let us know via e-mail, and we'll 

pseudonymous decentralized marketplace

2001-07-12 Thread Ray Dillinger



I've been attempting to design a decentralized auction/
exchange system that permits pseudonymous participants.  

By 'decentralized', I mean that NO central server, or 
subset of individual servers, controls access to any 
resource the system cannot work without; that there 
is no single point of failure. 

A consequence of this is that every ability that exists 
in any node, must exist in every node.  So the whole 
problem of currency issue gets the slightly weird 
solution of everybody has to be able to print their 
own money.  

The sticking point is that this basically means the 
system will be without any single universal currency.
A lot of E-cash techniques are usable, but what you wind 
up trading is certificates that represent goods or 
services offered by individuals in the system -- Alice 
the Farmer might issue certificates for bushels of 
wheat, while Bob the Carpenter might issue a bunch of 
certificates that say collect a thousand of these and 
I'll redeem them for a new 10x10 meter deck on your house 
and Carol the moneychanger might promise to redeem hers 
for one US dollar each, just for the amusement value of 
redeeming something in a system where hard currencies 
are the norm with a fiat currency. So these would be  
effectively a sort of digital merchants scrip, reducing 
back down to barter.

Exchange rates between the currencies issued by different 
participants would fluctuate according to trust and 
commodity values, and I'm okay with that.  Given the 
nature of the trust/reputation thing, I'd expect only 
a very small percentage of the participants to *actually* 
issue their own currency, as they wouldn't get good 
acceptance/exchange values until widely known, but 
everybody would have the ability.

The problem I'm running into is that while all kinds of 
e-cash protocols exist that protect the anonymity of 
the buyer and a lot protect the anonymity of the seller, 
there are none that protect the anonymity of the currency 
issuer, which would be ideal in this circumstance.  With 
the techniques I know of, the issuer can have only Nym 
protection. 

The basic problem with anonymizing the issuers (beyond 
technique alone) would be how the scrip gets redeemed 
when you don't necessarily know whom the issuer is.

Can anybody recommend appropriate reading?



Bear




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]