Re: Janet Reno on IP, piracy and terrorism

2001-01-09 Thread petro

  Bet on it? We don't have to do that -- look who he picked.
  Asscroft,
   the boob who got beat by a dead man. Check out his
  ultra-fascist voting
   record. Gag. Barf.

  Yes, but I bet he will burn very few children to death in a
  church during his first year.


 No, instead he'll probably burn pot smokers at the stake by the
millions.

The main difference being that the Church Goers *think* that 
what they are doing is legal, while the pot smokers (for the most 
part) know that what they are doing is either illegal, or legally 
questionable.

No, smoking pot *shouldn't* be illegal, but it is. If you get 
caught buying, selling, or smoking, it's you're own damn fault.

I am not aware of any law against joining or attending a church.

I have no argument with the rest
-- 
A quote from Petro's Archives:
**
"As someone who has worked both in private industry and in academia,
whenever I hear about academics wanting to teach ethics to people in
business, I want to puke."--Thomas Sowell.




GSM encryption. Reduction of algorithm. Interesting doc from GSM Org.

2001-01-09 Thread Bo Elkjær

 A5 algorithm key length.rtf 
Jrgen Bo Madsen
Fra:James Moran [[EMAIL PROTECTED]]
Sendt:  3. december 1999 12:02
Til:Jrgen Erik Bo Madsen
Emne:   A5 algorithm key length

Prioritet:  Hj
Jorgen,

Below you will find the answers to the questions posed in your letter
dated 12th October.

1.  Is the implementation of European GSM encryption algorithm A5/1
reduced in strength to 54 bits?
The key length of Kc used in the GSM encryption is 64 bits but
10 of the bits are set to 0. Therefore the effective key length is 54 bits.

2.  Is the implementation of the A5/1 encryption algorithm used in
one or more GSM systems in Denmark reduced in strength to 54 bits?
I can confirm that A5 must be used by all GSM operators and that
all GSM operators in Denmark currently use the standard algorithm which has
the 54 bit effective key length.

3.  Why is the A5/1 algorithm reduced in strength?
The key length is determined by control regulations that exist
in many countries regarding the use of encryption. As algorithms are treated
as dual use goods, similar to munitions, their movement and use is
regulated and certain countries place a limit on their strength. As GSM was
designed and developed to be used throughout Europe the design of the
algorithm had to take the restrictions of various countries into account.

4.  Who ordered the reduction of the A5 algorithm?
The algorithm specifications were written by ETSI SAGE and this
group would have decided on the key length.

If you require anything further do not hesitate to contact me.

Regards,

James



This e-mail is intended only for the addressee(s) named above. As this
e-mail may contain confidential or privileged information, if you are not a
named addressee, or the person responsible for delivering the message to the
named addressee, please telephone the Association immediately on the number
below. The contents should not be disclosed to any other person nor copies
taken.

James Moran
Fraud and Security Director
GSM Association Headquarters
Avoca Court, Temple Road, Blackrock, Co. Dublin, IRELAND.
Phone: +353 1 2091827;
Fax: +353 1 2695958
GSM: +353 86 8565124
Email: [EMAIL PROTECTED]  Web: http://www.gsmworld.com/


 A5 algorithm key length.rtf


Re: Anglo-American communications studies

2001-01-09 Thread petro

and there are very few opportunities for real misunderstanding.

So Ken if you read that Blair was near Thatcher's house and knocked
her up, Yanks would think something very different from Brits.

That's where technology can help : catch it on video.

I think I'm going to be sick...

-- 
Five seconds later, I'm getting the upside of 15Kv across the 
nipples. (These ambulance guys sure know how to party).
The Ideal we strive for: http://www.iinet.net.au/~bofh/bofh/bofh11.html




An Invitation From David Lamb

2001-01-09 Thread davidjel
I have sent this email to tell you about an innovative new program that is ROCKING THE INTERNET WORLD!  
Going Platinum is a new cooperative online community that PAYS YOU and is certain to change the way that you use the Internet forever!  Just click on the link below to get in on  the excitement!  

http://www.goingplatinum.com/member/davidjel

If your browser does not highlight the above link please just copy and paste the following URL in the address bar:

http://www.goingplatinum.com/member/davidjel  

My Going Platinum Member ID is "davidjel"  

Best regards,

David Lamb 



Re: Bell Case Subpoena

2001-01-09 Thread John Young

We've completed transcription of the subpoena and attachments:

   http://cryptome.org/jdb-subpoena.htm

The Information for Grand Jury Witnesses says, 

  "The witness is required to answer all questions asked, 
  except to the extent that a truthful answer to a question 
  would tend to incriminate the witness. A knowingly false 
  answer to any question could be the basis for a prosecution 
  of the witness for perjury. Anything a Grand Jury witness 
  says which tends to incriminate him may be used against 
  him by the Grand Jury, or later used against him in Court."

That's good 5A advice to protect against coercion, intimidation,
squealing, fishing, entrapment, blindsiding, ham sandwiching,
and believing you're saving your ass by disbelieving what the
witness Information threatens:

  "The mere fact that this information accompanies your subpoena
  should not be taken as any indication or suggestion that you
  are under investigation or are likely to be charged with a crime."





RE: Functional quantum computer?

2001-01-09 Thread Trei, Peter

He's an existance proof that people can be
intelligent in some areas, yet astoundingly
obtuse in others.

Peter

[Jim: It's ok that you have no problem with
your ineffective methods of giving pointers
to articles, but your wasting your own and
other's time - there's simply no reason for
people to follow your links, since they are
generally useless]

 --
 From: Reese[SMTP:[EMAIL PROTECTED]]
 Reply To: Reese
 Sent: Tuesday, January 09, 2001 1:55 AM
 To:   [EMAIL PROTECTED]
 Subject:  Re: Functional quantum computer?
 
 Jimbo's a real piece of work, ain't he?
 
 At 04:18 PM 1/8/01 -0600, Jim Choate wrote:
  
  On Mon, 8 Jan 2001, Trei, Peter wrote:
  
   Jim seems to have a real hard time with this concept.
  
  By the bitching you and others are making it's not I who has the
 problem.
  I have none (zero, nadah, null, nil).
  
   Last week, I privately mailed him a polite letter on
  
  And I told you to stop, you didn't. Don't give me consideration then
 don't
  bitch when you don't get it.
  
  
  
 Before a larger group can see the virtue of an idea, a
 smaller group must first understand it.
  
 "Stranger Suns"
 George Zebrowski
  
 The Armadillo Group   ,::;::-.  James Choate
 Austin, Tx   /:'/ ``::/|/  [EMAIL PROTECTED]
 www.ssz.com.',  `/( e\  512-451-7087
 -~~mm-'`-```-mm --'-
  
 




The uses of pseudo-links

2001-01-09 Thread Ray Dillinger



On Tue, 9 Jan 2001, Trei, Peter wrote:

[Jim: It's ok that you have no problem with
your ineffective methods of giving pointers
to articles, but your wasting your own and
other's time - there's simply no reason for
people to follow your links, since they are
generally useless]

Actually, not *entirely* useless.  Usually right after jim 
talks about an article and posts a link that doesn't point 
at it, someone else will post a correct link.  If Jim 
just shut up, some of these stories probably would escape 
our notice.  In the course of correcting his errors, people 
do provide useful information.

Bear





Re: Bell Case Subpoena

2001-01-09 Thread Jim Burnes

On Monday 08 January 2001 16:09, John Young wrote:
   You are also commanded to bring with you the following
   document(s) or object(s):

   Please provide any and all documents, papers, letters, computer
   disks, photographs, notes, objects, information, or other items
   in your possession or under your control, including electronically
   stored or computer records, which:

 1. Name, mention, describe, discuss, involve or relate to James
 Dalton Bell, a/k/a Jim Bell, or

 2.  Were previously possessed, owned, created, sent by, transported,
 or oftherwise affiliated with James Dalton Bell, a/k/a Jim Bell, or

How would you know if it was sent by him unless it had a digital signature
that you are willing to testify in court was know to belong to him and
had not been comprimised?

jim

-- 
Sometimes it is said that man can not be trusted with the government of
himself. Can he, then, be trusted with the government of others? Or have we
found angels in the forms of kings to govern him? Let history answer this
question.   -- Thomas Jefferson, 1st Inaugural




Re: The uses of pseudo-links

2001-01-09 Thread Tim May


At 8:04 AM -0800 1/9/01, Ray Dillinger wrote:
On Tue, 9 Jan 2001, Trei, Peter wrote:

[Jim: It's ok that you have no problem with
your ineffective methods of giving pointers
to articles, but your wasting your own and
other's time - there's simply no reason for
people to follow your links, since they are
generally useless]

Actually, not *entirely* useless.  Usually right after jim
talks about an article and posts a link that doesn't point
at it, someone else will post a correct link.  If Jim
just shut up, some of these stories probably would escape
our notice.  In the course of correcting his errors, people
do provide useful information.


Your definition of "useful" is different from mine. I believe lists 
like ours should primarily be about discussions and points of view, 
not a third-hand CNET or Register or Slashdot. There are many Web 
sources of breaking news (not that a lot of the "functional quantum 
computer" sorts of stories are usually breaking news...).

Personally, I like it when someone finds a news item, provides a 
detailed URL, even quotes (in ASCII, not MIME!) a paragraph or two, 
and then comments on it and connects it to Cypherpunks issues.

Merely dumping out "general science" items, with general URLs, is 
just plain abusing the list.

--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Review of History Channel's NSA documentary

2001-01-09 Thread Declan McCullagh

[The documentary aired again twice this morning on the History Channel, and 
it's a fair bet it'll show again later this week. --Declan


http://www.wired.com/news/politics/0,1283,41063,00.html

History Looks at the NSA
by Declan McCullagh ([EMAIL PROTECTED])

2:00 a.m. Jan. 9, 2001 PST
WASHINGTON -- As anyone who watched Enemy of the State knows, the
National Security Agency is a rapacious beast with an appetite for
data surpassed only by its disregard for Americans' privacy.

Or is the opposite true, and the ex-No Such Agency staffed by ardent
civil libertarians?

To the NSA, of course, its devilish reputation is merely an
unfortunate Hollywood fiction. Its director, Lt. Gen. Michael Hayden,
has taken every opportunity to say so, most recently on a History
Channel documentary that aired for the first time Monday evening.

"It's absolutely critical that (Americans) don't fear the power that
we have," Hayden said on the show.

He dismissed concerns about eavesdropping over-eagerness and all but
said the NSA, far from being one of the most feared agencies, has
become one of the most handicapped.

One reason, long cited by agency officials: Encryption. The show's
producers obligingly included stock footage of Saddam Hussein, saying
that the dictator-for-life has been spotted chatting on a 900-channel
encrypted cell phone.

That's no surprise. The NSA, as Steven Levy documents in his new
Crypto book (which the documentary overlooks), has spent the last 30
years trying to suppress data-scrambling technology through export
regulations, court battles, and even personal threats.

Instead of exploring that controversial and timely subject that's tied
to the ongoing debate over privacy online, "America's Most Secret
Agency" instead spends the bulk of an hour on a history of
cryptography starting in World War II. Most of the documentary could
have aired two decades ago, and no critics are interviewed.

One of the few surprises in the otherwise bland show is the NSA's new
raison d'etre -- infowar.

[...] 




Review of Steven Levy's Crypto

2001-01-09 Thread Declan McCullagh



http://www.wired.com/news/politics/0,1283,41071,00.html

Crypto: Three Decades in Review
by Declan McCullagh ([EMAIL PROTECTED])

8:20 a.m. Jan. 9, 2001 PST
WASHINGTON --It took only a year or two for a pair of computer and
math geeks to discover modern encryption technology in the 1970s. But
it's taken three decades for the full story to be told.

Transforming what is an unavoidably nerdy tale into the stuff of
passion and politics is not a trivial business, but Steven Levy, the
author of Crypto, proves himself more than up to the task.

Crypto (Viking Penguin, $25.95), is Levy's compelling history of the
personalities behind the development of data encryption, privacy and
authentication: The mathematicians who thought up the idea, the
businessmen who tried to sell it to an unsure public and the
bureaucrats who tried to control it.

Levy, a Newsweek writer and author of well-received technology
histories such as Hackers and Insanely Great, begins his book in 1969
with a profile of Whit Diffie, the tortured, quirky co-discoverer of
public key cryptography. Other characters soon populate the stage: The
MIT mathematicians eager to sign documents digitally; Jim Bidzos, the
Greek-born dealmaker who led RSA Data Security from ruin to success;
and Phil Zimmermann, the peace-activist-turned-programmer who gave the
world Pretty Good Privacy.

Until their contributions, the United States and other countries
suffered from a virtual crypto-embargo, under which the technology to
perform secure communications was carefully regulated as a munition
and used primarily by soldiers and spies.

But what about privacy and security? "On one side of the battle were
relative nobodies: computer hackers, academics and wonky civil
libertarians. On the other were some of the most powerful people in
the world: spies, generals and even presidents. Guess who won," Levy
writes.

(Full disclosure: A few years ago, Levy asked this writer to help him
research portions of the book. For whatever reason -- perhaps he found
what he needed elsewhere -- discussions ceased.)

Throughout Crypto's 356 pages, Levy takes the perspective of the
outsiders -- and, in some cases, rebels -- who popularized the
technology. Although he provides ample space for the U.S. government's
views, he casts the struggle between crypto-buffs and their federal
adversaries in terms familiar to foes of government control.

[...]




IRC FUD: Chapter II

2001-01-09 Thread Eric Cordian

On the heels of the Efnext debacle, I just read this fascinating 
article in Wired News which purports to explain that Usenet is already
dead, and IRC will be next. 

http://www.wired.com/news/culture/0,1284,41077,00.html

Methinks some people are just a teensy bit too eager to announce the
demise of certain Anarchistic parts of the Net as a forgone conclusion.

Particularly those parts which are used for Horsemen-related activities, 
and exist in a more supervised and LEA accessible form from providers
like AOL.

I'm not buying.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




Re: petro the bumpkin

2001-01-09 Thread A. Melon

Blank Frank wrote:

At 03:05 AM 1/9/01 -0500, petro wrote:
 The main difference being that the Church Goers *think* that
what they are doing is legal, while the pot smokers (for the most
part) know that what they are doing is either illegal, or legally
questionable.

Depends which church you subscribe to.  Rastafarians, for instance.
Christians in china.  Mormonism last century.

Pot is a sacrement for Rasta's, Hindu's, etc, and was for Hindu's for
instance long before the goddamned christen church ever existed.


 No, smoking pot *shouldn't* be illegal, but it is. If you get
caught buying, selling, or smoking, it's you're own damn fault.

Being Juden in Germany shouldn't have been illegal, but if they
got saponified, its their own damn fault, eh?

 I am not aware of any law against joining or attending a church.

You don't seem very aware, period...

   Rather amazing that the goddamned christians think the 1st only
means freedom of religion for them. It would be a truly good thing
if some of their goddamned churches got burned down to celebrate
Ashcroft's nomination. And more, with people in them, if he gets
approved. 




Re: Bell Case Subpoena

2001-01-09 Thread Bill Stewart

On Monday 08 January 2001 16:09, John Young wrote:
   You are also commanded to bring with you the following
   document(s) or object(s):

   Please provide any and all documents, papers, letters, computer
   disks, photographs, notes, objects, information, or other items
   in your possession or under your control, including electronically
   stored or computer records, which:

 1. Name, mention, describe, discuss, involve or relate to James
 Dalton Bell, a/k/a Jim Bell, or

 2.  Were previously possessed, owned, created, sent by, transported,
 or oftherwise affiliated with James Dalton Bell, a/k/a Jim Bell, or

How would you know if it was sent by him unless it had a digital signature
that you are willing to testify in court was know to belong to him and
had not been comprimised?

I'd think there'd be serious problems with most of the evidence
in this case being hearsay, except stuff specifically
posted by Jim Bell.
Thanks! 
Bill
Bill Stewart, [EMAIL PROTECTED]
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




sterno

2001-01-09 Thread Robin Cushman




Are you the one selling 
products such as the sterno?

If so I would like to bid on the cases of sterno

please email me

Robin


Fw: sterno

2001-01-09 Thread Robin Cushman



Sorry about this email. I am seriously looking for 
sterno and did not realize this was a joke - du!

- Original Message - 
From: Robin Cushman 
To: [EMAIL PROTECTED] 
Sent: Wednesday, January 10, 2001 4:59 AM
Subject: sterno


Are you the one selling 
products such as the sterno?

If so I would like to bid on the cases of sterno

please email me

Robin


Re: Bell Case Subpoena

2001-01-09 Thread Tim May

At 12:33 PM -0800 1/9/01, Bill Stewart wrote:
  On Monday 08 January 2001 16:09, John Young wrote:
 You are also commanded to bring with you the following
document(s) or object(s):

Please provide any and all documents, papers, letters, computer
disks, photographs, notes, objects, information, or other items
in your possession or under your control, including electronically
stored or computer records, which:

   1. Name, mention, describe, discuss, involve or relate to James
   Dalton Bell, a/k/a Jim Bell, or

  2.  Were previously possessed, owned, created, sent by, transported,
  or oftherwise affiliated with James Dalton Bell, a/k/a Jim Bell, or

How would you know if it was sent by him unless it had a digital signature
that you are willing to testify in court was know to belong to him and
had not been comprimised?

I'd think there'd be serious problems with most of the evidence
in this case being hearsay, except stuff specifically
posted by Jim Bell.

ven a "From: Jim Bell" doesn't prove anything. Besides knowing this 
from first principles (about spoofing, signatures, etc.), we have 
seen this demonstrated on this very list. Recall that various posters 
were claiming to be "Toto" during the unfolding of that situation.

Recall that Detweiler (presumably) used to issue posts with my name 
attached, with Nick Szabo's name attached, with Eric Hughes' name 
attached, etc.

These points were never tested in the court cases of Bell or Parker.

John Young could quite easily show up in Seattle with _none_ of the 
items the subpoena calls for. If questioned, he could say he had no 
means of knowing if the articles, posts, etc. were in fact from Bell 
or were generated by Infowar cointelpro operatives in law enforcement 
or even by Detweiler or May or whomever.

Also, even if he chooses to comply and grep through his mail archives 
for "any and all documents...mention...discussJim Bell," this 
would presumably turn up many hundreds of such documents. And the 
provenance will be unknown (an ordinary mail spool, or Eudora folder, 
or Outlook Express whatever, etc., being editable and alterable).

John Young (or anyone else) could have edited his mail spool to put 
words into "Bell"'s alleged mail.

I expect this upcoming trial will not be the case which hinges on 
these kinds of issues, but some court will someday have to contend 
with this utter malleability of received mail files. Unlike paper 
letters which can be forensically analyzed, e-mail is nearly 
meaningless.


--Tim May
-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




crypto implementation for small footprint devices

2001-01-09 Thread Xiao, Peter

Hi,

I am currently looking for crypto implementation that can fit into small
footprint (in the order of 50K or less) devices. Ideally, an SSL type of
protocol meets my requirements but it is almost impossible to implement it
within 50K even with selected cipher suites. So, I am looking for
alternatives (either symmetric key or public key based). I was thinking
about WTLS but looks like its implementation can not be significantly
smaller than that of TLS since it is also based on Public Key cryptography
(I am wondering how it fits into a cellphone). Can any one tell me what is
the approximate size of the client implementation of WTLS. Also, would
anyone send some pointers to me regarding what I am looking for.

Thanks in advance!!

Peter




As Dot-Coms Go Bust in the U.S., Bermuda Hosts a Little Boomlet

2001-01-09 Thread mean-green

As Dot-Coms Go Bust in the U.S.,
Bermuda Hosts a Little Boomlet
By MICHAEL ALLEN 
Staff Reporter of THE WALL STREET JOURNAL


HAMILTON, Bermuda -- Operating out of a hurricane-proof command center in 
a former U.S. military base, Paven Bratch is a tax examiner's nightmare.

Although his Internet company, music and video merchant Playcentric.com 
(www.playcentric.com1), has just 10 employees, didn't go live until September 
and has yet to turn a profit, it has the structure of a major multinational. 
Its computer servers are located here, its operating unit is in Barbados,
 and it has a distribution deal with a big record-store chain in Toronto. 
The 36-year-old Mr. Bratch figures this setup will save him so much on corporate 
income taxes and other expenses that he'll be able to undercut Amazon.com 
Inc.'s prices by more than 45% and still make a bundle.

"One thing that always amazes me is, why would anyone who's planning on 
generating a profit locate themselves in a full-tax jurisdiction?" he says.

'First Generation'

Plenty of dot-coms are asking themselves the same question these days. Undaunted 
by their industry's growing ranks of flameouts and hoping to emerge as one 
of the profitable few, dozens of them are popping up in tax havens around 
the world.

In Bermuda, they range from tiny publisher ISI Publications Ltd., which 
sells hard-to-find business books under the domain name Booksonbiz.com 
(www.booksonbiz.com2),
 to E*Trade Group Inc., the big online stockbroker, which is locating its 
international trading operations here. Further south, on the Caribbean island 
of Antigua, an American trader has set up Indextrade.com (www.indextrade.com3) 
to allow small investors to bet on swings in market indexes, while in Cyprus,
 a former British jazz singer is doing a brisk business by listing vessels 
such as a Soviet-era submarine on Ships-for-sale.com (www.ships-for-sale.com4).

"These merchants are the first generation who can really domicile anywhere,
" says Andrea Wilson, chief executive of Bermuda-based First Atlantic Commerce 
Ltd. (www.firstatlanticcommerce.com5), which provides credit-card payment 
systems for e-businesses. "They can be a virtual corporation if they choose."

The trend started with Internet gambling companies, which fled to the Caribbean 
to avoid the long arm of U.S. law. But now, thanks to an explosion of new 
telecommunications links to places such as Bermuda and Britain's Channel 
Islands -- and an ambitious push by promoters in such countries as Panama 
to set up facilities capable of hosting hundreds or thousands of Web sites 
each -- more-legitimate Internet companies are starting to make the leap 
offshore.

A Wealth of Ambiguity

There are serious questions about whether some of the structures would pass 
muster with the Internal Revenue Service and its foreign counterparts. But 
many accountants figure there's enough ambiguity in the industrial world's 
offshore tax codes that e-commerce companies could, at least theoretically,
 rack up tax-free profits for years before the authorities sort things out.

The issues are often murkier than for a standard offshore tax shelter, because 
they involve technological innovations that the U.S. Treasury couldn't have 
anticipated when it began laying the ground rules for offshore taxation 
in the 1960s. For instance, nobody's entirely sure how to tax the earnings 
of a programmer who sells his software by allowing buyers to download it 
from a Web site hosted on a computer server in a zero-tax jurisdiction.

Some tax attorneys take the position that the sale takes place where the 
server is located, and that the business owes no corporate or sales tax 
in the buyer's home country. "It would be no different than you or I getting 
on a plane, flying to the Bahamas, and buying a T-shirt in the hotel," says 
Lazaro Mur, a Miami tax attorney.

New telecommunications options have brought Bermuda and much of the Caribbean 
even closer than a plane ride away. Cable  Wireless PLC's phone monopoly 
among former British colonies in the region is breaking up, and CW's new 
competitors are starting to lace the seabed with modern fiber-optic lines,
 breaking down old technological barriers to working offshore.

At the same time, so-called server farms -- warehouses built to accommodate 
row upon row of computer servers -- are sprouting up to accommodate high-
tech newcomers. At Fort Clayton, a former U.S. military base in Panama, 
local entrepreneurs plan to open a 50,000-square-foot "high-tech hotel" 
later this month they say will be capable of hosting as many as 1.2 million 
Web sites.

HavenCo, a self-proclaimed "data haven," announced plans last year to host 
Web sites from an antiaircraft platform abandoned by the British after World 
War II. The North Sea platform has a colorful history: In 1966, a retired 
British army major seized control of it and has operated it for years as 
the sovereign "Principality of Sealand."

Ryan 

RE: crypto implementation for small footprint devices

2001-01-09 Thread Phillip Zakas

what kind of platform? are you counting on an internal processor, or are you
just storing a key to be acted on via a second device?  need more info.
pz

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Xiao, Peter
Sent: Tuesday, January 09, 2001 6:43 PM
To: '[EMAIL PROTECTED]'; [EMAIL PROTECTED]
Subject: crypto implementation for small footprint devices



Hi,

I am currently looking for crypto implementation that can fit into small
footprint (in the order of 50K or less) devices. Ideally, an SSL type of
protocol meets my requirements but it is almost impossible to implement it
within 50K even with selected cipher suites. So, I am looking for
alternatives (either symmetric key or public key based). I was thinking
about WTLS but looks like its implementation can not be significantly
smaller than that of TLS since it is also based on Public Key cryptography
(I am wondering how it fits into a cellphone). Can any one tell me what is
the approximate size of the client implementation of WTLS. Also, would
anyone send some pointers to me regarding what I am looking for.

Thanks in advance!!

Peter





RE: crypto implementation for small footprint devices

2001-01-09 Thread Xiao, Peter



-Original Message-
From: Josh Richards [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, January 09, 2001 6:21 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: crypto implementation for small footprint devices


* Xiao, Peter [EMAIL PROTECTED] [20010109 16:01]:
 
 I am currently looking for crypto implementation that can fit into small
 footprint (in the order of 50K or less) devices. Ideally, an SSL type of
 protocol meets my requirements but it is almost impossible to implement it
 within 50K even with selected cipher suites. So, I am looking for
 alternatives (either symmetric key or public key based). I was thinking
 about WTLS but looks like its implementation can not be significantly
 smaller than that of TLS since it is also based on Public Key cryptography
 (I am wondering how it fits into a cellphone). Can any one tell me what is
 the approximate size of the client implementation of WTLS. Also, would
 anyone send some pointers to me regarding what I am looking for.

How small of footprint?  50K (presuming you mean in currency) isn't really
a measurement of footprint size to me. :)  Would something along the lines
of a Java iButton URL:http://www.ibutton.com/ match your requirements?  
It truly depends on what you need the device to be capable of...and I don't 
just mean the crypto implementation but is this a device to be self-powered?
How do you need to interface with it?  Etc.

The device is a DCT2000 set-top box with very limited footprint. Since the
box needs to run a lot of other applications, 50K is the space that we would
like to spend on the security purpose. The platform supports C interface.

-jr


Josh Richards [JTR38/JR539-ARIN]
[EMAIL PROTECTED]/cubicle.net/fix.net/freedom.gen.ca.us
Geek Research LLC - URL:http://www.geekresearch.com/
IP Network Engineering and Consulting




RE: crypto implementation for small footprint devices

2001-01-09 Thread Phillip Zakas


I know RSA B-Safe stuff is made to fit onto cell phones and pagers.  They
also are the public key vendor for DOCSIS cable boxes.  Maybe they can help
you.  www.rsa.com

pz


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Xiao, Peter
Sent: Tuesday, January 09, 2001 10:13 PM
To: 'Josh Richards'; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: crypto implementation for small footprint devices





-Original Message-
From: Josh Richards [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, January 09, 2001 6:21 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: crypto implementation for small footprint devices


* Xiao, Peter [EMAIL PROTECTED] [20010109 16:01]:

 I am currently looking for crypto implementation that can fit into small
 footprint (in the order of 50K or less) devices. Ideally, an SSL type of
 protocol meets my requirements but it is almost impossible to implement it
 within 50K even with selected cipher suites. So, I am looking for
 alternatives (either symmetric key or public key based). I was thinking
 about WTLS but looks like its implementation can not be significantly
 smaller than that of TLS since it is also based on Public Key cryptography
 (I am wondering how it fits into a cellphone). Can any one tell me what is
 the approximate size of the client implementation of WTLS. Also, would
 anyone send some pointers to me regarding what I am looking for.

How small of footprint?  50K (presuming you mean in currency) isn't really
a measurement of footprint size to me. :)  Would something along the lines
of a Java iButton URL:http://www.ibutton.com/ match your requirements?
It truly depends on what you need the device to be capable of...and I don't
just mean the crypto implementation but is this a device to be self-powered?
How do you need to interface with it?  Etc.

The device is a DCT2000 set-top box with very limited footprint. Since the
box needs to run a lot of other applications, 50K is the space that we would
like to spend on the security purpose. The platform supports C interface.

-jr


Josh Richards [JTR38/JR539-ARIN]
[EMAIL PROTECTED]/cubicle.net/fix.net/freedom.gen.ca.us
Geek Research LLC - URL:http://www.geekresearch.com/
IP Network Engineering and Consulting





Re: Bell Case Subpoena

2001-01-09 Thread Declan McCullagh

On Tue, Jan 09, 2001 at 02:44:57PM -0800, Tim May wrote:
 I expect this upcoming trial will not be the case which hinges on 
 these kinds of issues, but some court will someday have to contend 
 with this utter malleability of received mail files. Unlike paper 
 letters which can be forensically analyzed, e-mail is nearly 
 meaningless.

Yes and no. Courts have figured out long ago how to deal with
malleable computer files, of which email is a special case. And notes
allegedly taken during a telephone call or meeting (which were
important during the MS antitrust trial) are equally malleable.

What the prosecution here is interested in is chain of custody, did
you receive this message, can you verify that Exhibit A is what you
received from [EMAIL PROTECTED], etc. with perjury as a
deterrent. Then they can use phone records to show a defendant was
online then via a dialup connection...

It strikes me that this is a sort of link padding: If you're online
all the time, those phone records will be virtually useless.

-Declan




Re: CDR: [alg] gpg with gnome clients (fwd)

2001-01-09 Thread petro

Attachment converted: 9main:CDR- [alg] gpg with gnome clien 
(MiME/CSOm) (00039B4A)

The camel's back has just broken.


-- 
A quote from Petro's Archives:
**
"As someone who has worked both in private industry and in academia,
whenever I hear about academics wanting to teach ethics to people in
business, I want to puke."--Thomas Sowell.