Cryptography-Digest Digest #512
Cryptography-Digest Digest #512, Volume #13 Sun, 21 Jan 01 06:13:01 EST Contents: Re: How to pronounce Vigenere (Adrian Edmonds) From: Adrian Edmonds [EMAIL PROTECTED] Subject: Re: How to pronounce Vigenere Date: Sun, 21 Jan 2001 12:31:05 +0200 Richard John Cavell [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED] .au... No idea. Can anyone help? snip vee zhen air Ref: http://www.quantdec.com/encryption.htm -- /\ Adrian Edmonds \ / ASCII RIBBON CAMPAIGN XAGAINST HTML MAIL, / \ AND NEWS TOO -- ** FOR YOUR REFERENCE ** The service address, to which questions about the list itself and requests to be added to or deleted from it should be directed, is: Internet: [EMAIL PROTECTED] You can send mail to the entire list by posting to sci.crypt. End of Cryptography-Digest Digest **
Cryptography-Digest Digest #512
Cryptography-Digest Digest #512, Volume #9Fri, 7 May 99 07:13:03 EDT Contents: Re: The simplest to understand and as secure as it gets. (SCOTT19U.ZIP_GUY) EPIC Hails Ruling in Encryption Case (EPIC News) Re: Shamir's Discover: to those in the know (Reuben Sumner) Re: Crypto export limits ruled unconstitutional (SCOTT19U.ZIP_GUY) Re: Crypto export limits ruled unconstitutional (David Lesher) Re: Roulettes (Mok-Kong Shen) Re: Obvious flaws in cipher design (Nikos Mavroyanopoulos) Re: Thought question: why do public ciphers use only simple ops like shift and XOR? (D. J. Bernstein) Luxury Back Massage at SUPER Below market price for internet ONLY (James Scott) Re: Roulettes (Mok-Kong Shen) ppdd-0.8 disc encryption (incl root swap) for Linux (Allan Latham) Re: The simplest to understand and as secure as it gets. ([EMAIL PROTECTED]) From: SCOTT19U.ZIP_GUY [EMAIL PROTECTED] Crossposted-To: talk.politics.crypto,alt.privacy Subject: Re: The simplest to understand and as secure as it gets. Date: Thu, 06 May 1999 23:02:53 GMT In article [EMAIL PROTECTED], "Dr Braddock" [EMAIL PROTECTED] wrote: How do I get a hold of scott19u.zip outside the usa? Is there a site in the Netherlands for example? Regards Dr Braddock I am not sure exactly how to do it. You could wait till someone posts it like they did scott16u.zip which is available anywhere or you could access it at a protected site by means that the US government would not like. Or I think if I wirite a book however that is done I can include a listing. But I hope some brave person in the FREE WORLD can just give you a copy. It is kind of a joke you can get any of the AES stuff which the US claims is suppose to be good stuff. But when a private citizen writes something you can't easily get it. Even when it is for free. David Scott -- http://cryptography.org/cgi-bin/crypto.cgi/Misc/scott19u.zip http://members.xoom.com/ecil/index.htm NOTE EMAIL address is for SPAMERS to email me use address on WEB PAGE = Posted via Deja News, The Discussion Network http://www.dejanews.com/ Search, Read, Discuss, or Start Your Own -- From: [EMAIL PROTECTED] (EPIC News) Crossposted-To: talk.politics.crypto,alt.privacy Subject: EPIC Hails Ruling in Encryption Case Date: Thu, 06 May 1999 23:40:46 -0500 FOR IMMEDIATE RELEASE CONTACT: May 6, 1999 David L. Sobel 202-54409240 EPIC HAILS FEDERAL APPEALS COURT DECISION IN ENCRYPTION CASE WASHINGTON, DC - The Electronic Privacy Information Center (EPIC) welcomes today's decision of the U.S. Court of Appeals for the Ninth Circuit, which declared U.S. export controls on encryption software to be an unconstitutional prior restraint of speech. EPIC was both co-counsel and coordinator of a "friend-of-the-court" (amicus) brief in the case, arguing against the government controls on privacy-enhancing technology. The decision was issued in Bernstein v. Department of Justice. The Ninth Circuit held that the government's regulation of encryption under the Export Administration Regulations constituted an impermissible prior restraint on protected speech. The court further said that the regulations "vest boundless discretion in government officials" and "lack adequate procedural safeguards." Marc Rotenberg, Executive Director of EPIC, said, "The Ninth Circuit has provided a sweeping opinion in support of privacy and the freedom to use encryption. This is a forward-looking judgment that touches on many of the issues of greatest concern to Internet users, including the right to speak anonymously and the right of informational privacy." David L. Sobel, EPIC's General Counsel, called the opinion "one of the most significant Internet decisions yet issued, one that establishes important precedents for both free speech and privacy online." He added that, "the court has recognized a fundamental truth -- citizens need greater privacy protection in our new networked communications environment." In its decision, the Ninth Circuit wrote: "Whether we are surveilled by our government, by criminals, or by our neighbors, it is fair to say that never has our ability to shield our affairs from prying eyes been at such a low ebb. The availability and use of secure encryption may offer an opportunity to reclaim some portion of the privacy we have lost. Government efforts to control encryption thus may well implicate not only the First Amendment rights of cryptographers intent on pushing the boundaries of their science, but also the constitutional rights of each of us as potential recipients of encryption's bounty. . . . [I]t is important to point out that Bernstein's is a suit not merely concerning a small group
Cryptography-Digest Digest #512
Cryptography-Digest Digest #512, Volume #10 Fri, 5 Nov 99 12:13:02 EST Contents: Re: Bit/byte orientation in SHA-1 (Francois Grieu) Re: Lenstra on key sizes (DJohn37050) Re: The Code Book ("Sandy Macpherson") Re: How protect HDisk against Customs when entering Great Britain (CoyoteRed) Re: How protect HDisk against Customs when entering Great Britain (CoyoteRed) Re: How protect HDisk against Customs when entering Great Britain (CoyoteRed) Re: How protect HDisk against Customs when entering Great Britain (CoyoteRed) Re: How protect HDisk against Customs when entering Great Britain (CoyoteRed) The Code Book Mailing List ("Sandy Macpherson") Re: How protect HDisk against Customs when entering Great Britain (Anonymous) PGP Cracked ? ("Harry Solomon") OT: Re: How protect HDisk against Customs any references of this activity ? ("Juergen Nieveler / CompuNet") Re: Compression: A ? for David Scott (Tom) From: [EMAIL PROTECTED] (Francois Grieu) Subject: Re: Bit/byte orientation in SHA-1 Date: Fri, 05 Nov 1999 15:31:50 +0100 [EMAIL PROTECTED] wrote (*) I am trying to verify a module which implements the FIPS PUB 180-1 SHA-1 specification which is bit oriented. The C-implementation of Steve Reid, which I use currently for verification, is byte orientated. Can anyone point me to C-implementation which is bit orientated ? I can't, but here are test vectors Jim Gillogly and I have jointly cross-checked on Aug 1998, and may have survived my editing. In sequence you get the hash of the empty message, of the single bit message with a 0 bit, and so on. 110#148|11 is a 446 bits message made of the three bits 110 repeated 148 times, followed by the two bits 11. The last message has 2^32+1 bits. DA39A3EE 5E6B4B0D 3255BFEF 95601890 AFD80709 0 BB6B3E18 F0115B57 92524167 6F5B1AE8 8747B08A 106E42FB84 067CFF05 6C43A49E 484997AF 23190879 101 4B340598 99D74DAF EE6335CA FDC44A9E EFB154BE 0101 98232A15 3453149A F8D52A61 503A5074 B85970E8 01010 4D2D46F1 1C375398 F8C9FB3B C4626B67 8AE61BFD 10BC7A6F90 379A5111 E1B2D6EC 9C5A17AD B11332FD 001 6A764A56 F4EDD7AF EAE50B7B 5D0ECB6A 58650793 01010101 B2C7C0CA A10A0CCA 5EA7D69E 54018AE0 C0389DD6 010101010 F1D7529B ACE5E528 FD9A0B4F 9BDF5BCB AA8FCEF9 101010101059144C0B D8CE0C00 EA527C00 84999AD2 6AC90005 111011000100110001676315ED 9F279442 DCF41CA9 1CA9973F DC59A242 0111011000100110001 DC4E4B58 B2FBBC53 3F20BA2C 07A89019 66E50369 01110110001001100011 A9993E36 4706816A BA3E2571 7850C26C 9CD0D89D 101#143C09E2DF 9D311061 A5F3E0F1 4660803F 091AB19A 110#148|11CE7387AE 577337BE 54EA94F8 2C842E8B E76BC3E1 110#149 DE244F06 3142CB2F 4C903B7F 7660577F 9E0D8791 110#149|1 A3D29824 27AE39C8 920CA5F4 99D6C2BD 71EBF03C 110#149|11351AAB58 FF93CF12 AF7D5A58 4CFC8F7D 81023D10 110#170 99638692 1E480D4E 2955E727 5DF3522C E8F5AB6E 110#170|1 BB5F4AD4 8913F51B 157EB985 A5C2034B 8243B01B 110#170|119E92C554 2237B957 BA2244E8 141FDB66 DEC730A5 110#171 2103E454 DA4491F4 E32DD425 A3341DC9 C2A90848 011#490 B4B18049 DE405027 528CD9E7 4B2EC540 D4E6F06B 011#490|0 34C63356 B3087427 20AB9669 14EB0FC9 26E4294B 011#490|0175FACE18 02B9F84F 326368AB 06E73E05 02E9EA34 011#491 7C2C3D62 F6AEC28D 94CDF93F 02E739E7 490698A1 011#1431655764|01 4CB0C4EF 69143D5B F34FC35F 1D4B19F6 ECCAE0F2 011#143165576547D92F91 1FC7BB74 DE00ADFC 4E981A81 05556D52 011#1431655765|0 A3D7438C 589B0B93 2AA91CC2 446F06DF 9ABC73F0 011#1431655765|01 3EEE3E1E 28DEDE2C A444D68D A5675B2F AAAB3203 Hope this helps. Francois Grieu [reposted version, differing from the first by the position of a space] -- (*) apparently while he or she was connected from worldonline.nl under IP 195.241.186.167 as attributed on 4 Nov 1999 19:33:01 GMT [additional trace info available in the original post] -- From: [EMAIL PROTECTED] (DJohn37050) Subject: Re: Lenstra on key sizes Date: 05 Nov 1999 14:37:43 GMT Regarding my "naysayer" comment above, I wish to explain more. Arjen is one of the most accomplished algorithm "crackers" and I have the highest respect for his ability. He has expressed concern about ECC in the past, and such concern was posted by RSA on their ECC website. I should have mentioned this in my previous posting instead of using the term "naysayer". Arjen points out in his recent paper that there has been no significant progress in attac