Re: Janet Reno on IP, piracy and terrorism
Bet on it? We don't have to do that -- look who he picked. Asscroft, the boob who got beat by a dead man. Check out his ultra-fascist voting record. Gag. Barf. Yes, but I bet he will burn very few children to death in a church during his first year. No, instead he'll probably burn pot smokers at the stake by the millions. The main difference being that the Church Goers *think* that what they are doing is legal, while the pot smokers (for the most part) know that what they are doing is either illegal, or legally questionable. No, smoking pot *shouldn't* be illegal, but it is. If you get caught buying, selling, or smoking, it's you're own damn fault. I am not aware of any law against joining or attending a church. I have no argument with the rest -- A quote from Petro's Archives: ** "As someone who has worked both in private industry and in academia, whenever I hear about academics wanting to teach ethics to people in business, I want to puke."--Thomas Sowell.
GSM encryption. Reduction of algorithm. Interesting doc from GSM Org.
A5 algorithm key length.rtf Jrgen Bo Madsen Fra:James Moran [[EMAIL PROTECTED]] Sendt: 3. december 1999 12:02 Til:Jrgen Erik Bo Madsen Emne: A5 algorithm key length Prioritet: Hj Jorgen, Below you will find the answers to the questions posed in your letter dated 12th October. 1. Is the implementation of European GSM encryption algorithm A5/1 reduced in strength to 54 bits? The key length of Kc used in the GSM encryption is 64 bits but 10 of the bits are set to 0. Therefore the effective key length is 54 bits. 2. Is the implementation of the A5/1 encryption algorithm used in one or more GSM systems in Denmark reduced in strength to 54 bits? I can confirm that A5 must be used by all GSM operators and that all GSM operators in Denmark currently use the standard algorithm which has the 54 bit effective key length. 3. Why is the A5/1 algorithm reduced in strength? The key length is determined by control regulations that exist in many countries regarding the use of encryption. As algorithms are treated as dual use goods, similar to munitions, their movement and use is regulated and certain countries place a limit on their strength. As GSM was designed and developed to be used throughout Europe the design of the algorithm had to take the restrictions of various countries into account. 4. Who ordered the reduction of the A5 algorithm? The algorithm specifications were written by ETSI SAGE and this group would have decided on the key length. If you require anything further do not hesitate to contact me. Regards, James This e-mail is intended only for the addressee(s) named above. As this e-mail may contain confidential or privileged information, if you are not a named addressee, or the person responsible for delivering the message to the named addressee, please telephone the Association immediately on the number below. The contents should not be disclosed to any other person nor copies taken. James Moran Fraud and Security Director GSM Association Headquarters Avoca Court, Temple Road, Blackrock, Co. Dublin, IRELAND. Phone: +353 1 2091827; Fax: +353 1 2695958 GSM: +353 86 8565124 Email: [EMAIL PROTECTED] Web: http://www.gsmworld.com/ A5 algorithm key length.rtf
Re: Anglo-American communications studies
and there are very few opportunities for real misunderstanding. So Ken if you read that Blair was near Thatcher's house and knocked her up, Yanks would think something very different from Brits. That's where technology can help : catch it on video. I think I'm going to be sick... -- Five seconds later, I'm getting the upside of 15Kv across the nipples. (These ambulance guys sure know how to party). The Ideal we strive for: http://www.iinet.net.au/~bofh/bofh/bofh11.html
An Invitation From David Lamb
I have sent this email to tell you about an innovative new program that is ROCKING THE INTERNET WORLD! Going Platinum is a new cooperative online community that PAYS YOU and is certain to change the way that you use the Internet forever! Just click on the link below to get in on the excitement! http://www.goingplatinum.com/member/davidjel If your browser does not highlight the above link please just copy and paste the following URL in the address bar: http://www.goingplatinum.com/member/davidjel My Going Platinum Member ID is "davidjel" Best regards, David Lamb
Re: Bell Case Subpoena
We've completed transcription of the subpoena and attachments: http://cryptome.org/jdb-subpoena.htm The Information for Grand Jury Witnesses says, "The witness is required to answer all questions asked, except to the extent that a truthful answer to a question would tend to incriminate the witness. A knowingly false answer to any question could be the basis for a prosecution of the witness for perjury. Anything a Grand Jury witness says which tends to incriminate him may be used against him by the Grand Jury, or later used against him in Court." That's good 5A advice to protect against coercion, intimidation, squealing, fishing, entrapment, blindsiding, ham sandwiching, and believing you're saving your ass by disbelieving what the witness Information threatens: "The mere fact that this information accompanies your subpoena should not be taken as any indication or suggestion that you are under investigation or are likely to be charged with a crime."
RE: Functional quantum computer?
He's an existance proof that people can be intelligent in some areas, yet astoundingly obtuse in others. Peter [Jim: It's ok that you have no problem with your ineffective methods of giving pointers to articles, but your wasting your own and other's time - there's simply no reason for people to follow your links, since they are generally useless] -- From: Reese[SMTP:[EMAIL PROTECTED]] Reply To: Reese Sent: Tuesday, January 09, 2001 1:55 AM To: [EMAIL PROTECTED] Subject: Re: Functional quantum computer? Jimbo's a real piece of work, ain't he? At 04:18 PM 1/8/01 -0600, Jim Choate wrote: On Mon, 8 Jan 2001, Trei, Peter wrote: Jim seems to have a real hard time with this concept. By the bitching you and others are making it's not I who has the problem. I have none (zero, nadah, null, nil). Last week, I privately mailed him a polite letter on And I told you to stop, you didn't. Don't give me consideration then don't bitch when you don't get it. Before a larger group can see the virtue of an idea, a smaller group must first understand it. "Stranger Suns" George Zebrowski The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
The uses of pseudo-links
On Tue, 9 Jan 2001, Trei, Peter wrote: [Jim: It's ok that you have no problem with your ineffective methods of giving pointers to articles, but your wasting your own and other's time - there's simply no reason for people to follow your links, since they are generally useless] Actually, not *entirely* useless. Usually right after jim talks about an article and posts a link that doesn't point at it, someone else will post a correct link. If Jim just shut up, some of these stories probably would escape our notice. In the course of correcting his errors, people do provide useful information. Bear
Re: Bell Case Subpoena
On Monday 08 January 2001 16:09, John Young wrote: You are also commanded to bring with you the following document(s) or object(s): Please provide any and all documents, papers, letters, computer disks, photographs, notes, objects, information, or other items in your possession or under your control, including electronically stored or computer records, which: 1. Name, mention, describe, discuss, involve or relate to James Dalton Bell, a/k/a Jim Bell, or 2. Were previously possessed, owned, created, sent by, transported, or oftherwise affiliated with James Dalton Bell, a/k/a Jim Bell, or How would you know if it was sent by him unless it had a digital signature that you are willing to testify in court was know to belong to him and had not been comprimised? jim -- Sometimes it is said that man can not be trusted with the government of himself. Can he, then, be trusted with the government of others? Or have we found angels in the forms of kings to govern him? Let history answer this question. -- Thomas Jefferson, 1st Inaugural
Re: The uses of pseudo-links
At 8:04 AM -0800 1/9/01, Ray Dillinger wrote: On Tue, 9 Jan 2001, Trei, Peter wrote: [Jim: It's ok that you have no problem with your ineffective methods of giving pointers to articles, but your wasting your own and other's time - there's simply no reason for people to follow your links, since they are generally useless] Actually, not *entirely* useless. Usually right after jim talks about an article and posts a link that doesn't point at it, someone else will post a correct link. If Jim just shut up, some of these stories probably would escape our notice. In the course of correcting his errors, people do provide useful information. Your definition of "useful" is different from mine. I believe lists like ours should primarily be about discussions and points of view, not a third-hand CNET or Register or Slashdot. There are many Web sources of breaking news (not that a lot of the "functional quantum computer" sorts of stories are usually breaking news...). Personally, I like it when someone finds a news item, provides a detailed URL, even quotes (in ASCII, not MIME!) a paragraph or two, and then comments on it and connects it to Cypherpunks issues. Merely dumping out "general science" items, with general URLs, is just plain abusing the list. --Tim May -- Timothy C. May [EMAIL PROTECTED]Corralitos, California Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns
Review of History Channel's NSA documentary
[The documentary aired again twice this morning on the History Channel, and it's a fair bet it'll show again later this week. --Declan http://www.wired.com/news/politics/0,1283,41063,00.html History Looks at the NSA by Declan McCullagh ([EMAIL PROTECTED]) 2:00 a.m. Jan. 9, 2001 PST WASHINGTON -- As anyone who watched Enemy of the State knows, the National Security Agency is a rapacious beast with an appetite for data surpassed only by its disregard for Americans' privacy. Or is the opposite true, and the ex-No Such Agency staffed by ardent civil libertarians? To the NSA, of course, its devilish reputation is merely an unfortunate Hollywood fiction. Its director, Lt. Gen. Michael Hayden, has taken every opportunity to say so, most recently on a History Channel documentary that aired for the first time Monday evening. "It's absolutely critical that (Americans) don't fear the power that we have," Hayden said on the show. He dismissed concerns about eavesdropping over-eagerness and all but said the NSA, far from being one of the most feared agencies, has become one of the most handicapped. One reason, long cited by agency officials: Encryption. The show's producers obligingly included stock footage of Saddam Hussein, saying that the dictator-for-life has been spotted chatting on a 900-channel encrypted cell phone. That's no surprise. The NSA, as Steven Levy documents in his new Crypto book (which the documentary overlooks), has spent the last 30 years trying to suppress data-scrambling technology through export regulations, court battles, and even personal threats. Instead of exploring that controversial and timely subject that's tied to the ongoing debate over privacy online, "America's Most Secret Agency" instead spends the bulk of an hour on a history of cryptography starting in World War II. Most of the documentary could have aired two decades ago, and no critics are interviewed. One of the few surprises in the otherwise bland show is the NSA's new raison d'etre -- infowar. [...]
Review of Steven Levy's Crypto
http://www.wired.com/news/politics/0,1283,41071,00.html Crypto: Three Decades in Review by Declan McCullagh ([EMAIL PROTECTED]) 8:20 a.m. Jan. 9, 2001 PST WASHINGTON --It took only a year or two for a pair of computer and math geeks to discover modern encryption technology in the 1970s. But it's taken three decades for the full story to be told. Transforming what is an unavoidably nerdy tale into the stuff of passion and politics is not a trivial business, but Steven Levy, the author of Crypto, proves himself more than up to the task. Crypto (Viking Penguin, $25.95), is Levy's compelling history of the personalities behind the development of data encryption, privacy and authentication: The mathematicians who thought up the idea, the businessmen who tried to sell it to an unsure public and the bureaucrats who tried to control it. Levy, a Newsweek writer and author of well-received technology histories such as Hackers and Insanely Great, begins his book in 1969 with a profile of Whit Diffie, the tortured, quirky co-discoverer of public key cryptography. Other characters soon populate the stage: The MIT mathematicians eager to sign documents digitally; Jim Bidzos, the Greek-born dealmaker who led RSA Data Security from ruin to success; and Phil Zimmermann, the peace-activist-turned-programmer who gave the world Pretty Good Privacy. Until their contributions, the United States and other countries suffered from a virtual crypto-embargo, under which the technology to perform secure communications was carefully regulated as a munition and used primarily by soldiers and spies. But what about privacy and security? "On one side of the battle were relative nobodies: computer hackers, academics and wonky civil libertarians. On the other were some of the most powerful people in the world: spies, generals and even presidents. Guess who won," Levy writes. (Full disclosure: A few years ago, Levy asked this writer to help him research portions of the book. For whatever reason -- perhaps he found what he needed elsewhere -- discussions ceased.) Throughout Crypto's 356 pages, Levy takes the perspective of the outsiders -- and, in some cases, rebels -- who popularized the technology. Although he provides ample space for the U.S. government's views, he casts the struggle between crypto-buffs and their federal adversaries in terms familiar to foes of government control. [...]
IRC FUD: Chapter II
On the heels of the Efnext debacle, I just read this fascinating article in Wired News which purports to explain that Usenet is already dead, and IRC will be next. http://www.wired.com/news/culture/0,1284,41077,00.html Methinks some people are just a teensy bit too eager to announce the demise of certain Anarchistic parts of the Net as a forgone conclusion. Particularly those parts which are used for Horsemen-related activities, and exist in a more supervised and LEA accessible form from providers like AOL. I'm not buying. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law"
Re: petro the bumpkin
Blank Frank wrote: At 03:05 AM 1/9/01 -0500, petro wrote: The main difference being that the Church Goers *think* that what they are doing is legal, while the pot smokers (for the most part) know that what they are doing is either illegal, or legally questionable. Depends which church you subscribe to. Rastafarians, for instance. Christians in china. Mormonism last century. Pot is a sacrement for Rasta's, Hindu's, etc, and was for Hindu's for instance long before the goddamned christen church ever existed. No, smoking pot *shouldn't* be illegal, but it is. If you get caught buying, selling, or smoking, it's you're own damn fault. Being Juden in Germany shouldn't have been illegal, but if they got saponified, its their own damn fault, eh? I am not aware of any law against joining or attending a church. You don't seem very aware, period... Rather amazing that the goddamned christians think the 1st only means freedom of religion for them. It would be a truly good thing if some of their goddamned churches got burned down to celebrate Ashcroft's nomination. And more, with people in them, if he gets approved.
Re: Bell Case Subpoena
On Monday 08 January 2001 16:09, John Young wrote: You are also commanded to bring with you the following document(s) or object(s): Please provide any and all documents, papers, letters, computer disks, photographs, notes, objects, information, or other items in your possession or under your control, including electronically stored or computer records, which: 1. Name, mention, describe, discuss, involve or relate to James Dalton Bell, a/k/a Jim Bell, or 2. Were previously possessed, owned, created, sent by, transported, or oftherwise affiliated with James Dalton Bell, a/k/a Jim Bell, or How would you know if it was sent by him unless it had a digital signature that you are willing to testify in court was know to belong to him and had not been comprimised? I'd think there'd be serious problems with most of the evidence in this case being hearsay, except stuff specifically posted by Jim Bell. Thanks! Bill Bill Stewart, [EMAIL PROTECTED] PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
sterno
Are you the one selling products such as the sterno? If so I would like to bid on the cases of sterno please email me Robin
Fw: sterno
Sorry about this email. I am seriously looking for sterno and did not realize this was a joke - du! - Original Message - From: Robin Cushman To: [EMAIL PROTECTED] Sent: Wednesday, January 10, 2001 4:59 AM Subject: sterno Are you the one selling products such as the sterno? If so I would like to bid on the cases of sterno please email me Robin
Re: Bell Case Subpoena
At 12:33 PM -0800 1/9/01, Bill Stewart wrote: On Monday 08 January 2001 16:09, John Young wrote: You are also commanded to bring with you the following document(s) or object(s): Please provide any and all documents, papers, letters, computer disks, photographs, notes, objects, information, or other items in your possession or under your control, including electronically stored or computer records, which: 1. Name, mention, describe, discuss, involve or relate to James Dalton Bell, a/k/a Jim Bell, or 2. Were previously possessed, owned, created, sent by, transported, or oftherwise affiliated with James Dalton Bell, a/k/a Jim Bell, or How would you know if it was sent by him unless it had a digital signature that you are willing to testify in court was know to belong to him and had not been comprimised? I'd think there'd be serious problems with most of the evidence in this case being hearsay, except stuff specifically posted by Jim Bell. ven a "From: Jim Bell" doesn't prove anything. Besides knowing this from first principles (about spoofing, signatures, etc.), we have seen this demonstrated on this very list. Recall that various posters were claiming to be "Toto" during the unfolding of that situation. Recall that Detweiler (presumably) used to issue posts with my name attached, with Nick Szabo's name attached, with Eric Hughes' name attached, etc. These points were never tested in the court cases of Bell or Parker. John Young could quite easily show up in Seattle with _none_ of the items the subpoena calls for. If questioned, he could say he had no means of knowing if the articles, posts, etc. were in fact from Bell or were generated by Infowar cointelpro operatives in law enforcement or even by Detweiler or May or whomever. Also, even if he chooses to comply and grep through his mail archives for "any and all documents...mention...discussJim Bell," this would presumably turn up many hundreds of such documents. And the provenance will be unknown (an ordinary mail spool, or Eudora folder, or Outlook Express whatever, etc., being editable and alterable). John Young (or anyone else) could have edited his mail spool to put words into "Bell"'s alleged mail. I expect this upcoming trial will not be the case which hinges on these kinds of issues, but some court will someday have to contend with this utter malleability of received mail files. Unlike paper letters which can be forensically analyzed, e-mail is nearly meaningless. --Tim May -- Timothy C. May [EMAIL PROTECTED]Corralitos, California Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns
crypto implementation for small footprint devices
Hi, I am currently looking for crypto implementation that can fit into small footprint (in the order of 50K or less) devices. Ideally, an SSL type of protocol meets my requirements but it is almost impossible to implement it within 50K even with selected cipher suites. So, I am looking for alternatives (either symmetric key or public key based). I was thinking about WTLS but looks like its implementation can not be significantly smaller than that of TLS since it is also based on Public Key cryptography (I am wondering how it fits into a cellphone). Can any one tell me what is the approximate size of the client implementation of WTLS. Also, would anyone send some pointers to me regarding what I am looking for. Thanks in advance!! Peter
As Dot-Coms Go Bust in the U.S., Bermuda Hosts a Little Boomlet
As Dot-Coms Go Bust in the U.S., Bermuda Hosts a Little Boomlet By MICHAEL ALLEN Staff Reporter of THE WALL STREET JOURNAL HAMILTON, Bermuda -- Operating out of a hurricane-proof command center in a former U.S. military base, Paven Bratch is a tax examiner's nightmare. Although his Internet company, music and video merchant Playcentric.com (www.playcentric.com1), has just 10 employees, didn't go live until September and has yet to turn a profit, it has the structure of a major multinational. Its computer servers are located here, its operating unit is in Barbados, and it has a distribution deal with a big record-store chain in Toronto. The 36-year-old Mr. Bratch figures this setup will save him so much on corporate income taxes and other expenses that he'll be able to undercut Amazon.com Inc.'s prices by more than 45% and still make a bundle. "One thing that always amazes me is, why would anyone who's planning on generating a profit locate themselves in a full-tax jurisdiction?" he says. 'First Generation' Plenty of dot-coms are asking themselves the same question these days. Undaunted by their industry's growing ranks of flameouts and hoping to emerge as one of the profitable few, dozens of them are popping up in tax havens around the world. In Bermuda, they range from tiny publisher ISI Publications Ltd., which sells hard-to-find business books under the domain name Booksonbiz.com (www.booksonbiz.com2), to E*Trade Group Inc., the big online stockbroker, which is locating its international trading operations here. Further south, on the Caribbean island of Antigua, an American trader has set up Indextrade.com (www.indextrade.com3) to allow small investors to bet on swings in market indexes, while in Cyprus, a former British jazz singer is doing a brisk business by listing vessels such as a Soviet-era submarine on Ships-for-sale.com (www.ships-for-sale.com4). "These merchants are the first generation who can really domicile anywhere, " says Andrea Wilson, chief executive of Bermuda-based First Atlantic Commerce Ltd. (www.firstatlanticcommerce.com5), which provides credit-card payment systems for e-businesses. "They can be a virtual corporation if they choose." The trend started with Internet gambling companies, which fled to the Caribbean to avoid the long arm of U.S. law. But now, thanks to an explosion of new telecommunications links to places such as Bermuda and Britain's Channel Islands -- and an ambitious push by promoters in such countries as Panama to set up facilities capable of hosting hundreds or thousands of Web sites each -- more-legitimate Internet companies are starting to make the leap offshore. A Wealth of Ambiguity There are serious questions about whether some of the structures would pass muster with the Internal Revenue Service and its foreign counterparts. But many accountants figure there's enough ambiguity in the industrial world's offshore tax codes that e-commerce companies could, at least theoretically, rack up tax-free profits for years before the authorities sort things out. The issues are often murkier than for a standard offshore tax shelter, because they involve technological innovations that the U.S. Treasury couldn't have anticipated when it began laying the ground rules for offshore taxation in the 1960s. For instance, nobody's entirely sure how to tax the earnings of a programmer who sells his software by allowing buyers to download it from a Web site hosted on a computer server in a zero-tax jurisdiction. Some tax attorneys take the position that the sale takes place where the server is located, and that the business owes no corporate or sales tax in the buyer's home country. "It would be no different than you or I getting on a plane, flying to the Bahamas, and buying a T-shirt in the hotel," says Lazaro Mur, a Miami tax attorney. New telecommunications options have brought Bermuda and much of the Caribbean even closer than a plane ride away. Cable Wireless PLC's phone monopoly among former British colonies in the region is breaking up, and CW's new competitors are starting to lace the seabed with modern fiber-optic lines, breaking down old technological barriers to working offshore. At the same time, so-called server farms -- warehouses built to accommodate row upon row of computer servers -- are sprouting up to accommodate high- tech newcomers. At Fort Clayton, a former U.S. military base in Panama, local entrepreneurs plan to open a 50,000-square-foot "high-tech hotel" later this month they say will be capable of hosting as many as 1.2 million Web sites. HavenCo, a self-proclaimed "data haven," announced plans last year to host Web sites from an antiaircraft platform abandoned by the British after World War II. The North Sea platform has a colorful history: In 1966, a retired British army major seized control of it and has operated it for years as the sovereign "Principality of Sealand." Ryan
RE: crypto implementation for small footprint devices
what kind of platform? are you counting on an internal processor, or are you just storing a key to be acted on via a second device? need more info. pz -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Xiao, Peter Sent: Tuesday, January 09, 2001 6:43 PM To: '[EMAIL PROTECTED]'; [EMAIL PROTECTED] Subject: crypto implementation for small footprint devices Hi, I am currently looking for crypto implementation that can fit into small footprint (in the order of 50K or less) devices. Ideally, an SSL type of protocol meets my requirements but it is almost impossible to implement it within 50K even with selected cipher suites. So, I am looking for alternatives (either symmetric key or public key based). I was thinking about WTLS but looks like its implementation can not be significantly smaller than that of TLS since it is also based on Public Key cryptography (I am wondering how it fits into a cellphone). Can any one tell me what is the approximate size of the client implementation of WTLS. Also, would anyone send some pointers to me regarding what I am looking for. Thanks in advance!! Peter
RE: crypto implementation for small footprint devices
-Original Message- From: Josh Richards [mailto:[EMAIL PROTECTED]] Sent: Tuesday, January 09, 2001 6:21 PM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: crypto implementation for small footprint devices * Xiao, Peter [EMAIL PROTECTED] [20010109 16:01]: I am currently looking for crypto implementation that can fit into small footprint (in the order of 50K or less) devices. Ideally, an SSL type of protocol meets my requirements but it is almost impossible to implement it within 50K even with selected cipher suites. So, I am looking for alternatives (either symmetric key or public key based). I was thinking about WTLS but looks like its implementation can not be significantly smaller than that of TLS since it is also based on Public Key cryptography (I am wondering how it fits into a cellphone). Can any one tell me what is the approximate size of the client implementation of WTLS. Also, would anyone send some pointers to me regarding what I am looking for. How small of footprint? 50K (presuming you mean in currency) isn't really a measurement of footprint size to me. :) Would something along the lines of a Java iButton URL:http://www.ibutton.com/ match your requirements? It truly depends on what you need the device to be capable of...and I don't just mean the crypto implementation but is this a device to be self-powered? How do you need to interface with it? Etc. The device is a DCT2000 set-top box with very limited footprint. Since the box needs to run a lot of other applications, 50K is the space that we would like to spend on the security purpose. The platform supports C interface. -jr Josh Richards [JTR38/JR539-ARIN] [EMAIL PROTECTED]/cubicle.net/fix.net/freedom.gen.ca.us Geek Research LLC - URL:http://www.geekresearch.com/ IP Network Engineering and Consulting
RE: crypto implementation for small footprint devices
I know RSA B-Safe stuff is made to fit onto cell phones and pagers. They also are the public key vendor for DOCSIS cable boxes. Maybe they can help you. www.rsa.com pz -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Xiao, Peter Sent: Tuesday, January 09, 2001 10:13 PM To: 'Josh Richards'; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: crypto implementation for small footprint devices -Original Message- From: Josh Richards [mailto:[EMAIL PROTECTED]] Sent: Tuesday, January 09, 2001 6:21 PM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: crypto implementation for small footprint devices * Xiao, Peter [EMAIL PROTECTED] [20010109 16:01]: I am currently looking for crypto implementation that can fit into small footprint (in the order of 50K or less) devices. Ideally, an SSL type of protocol meets my requirements but it is almost impossible to implement it within 50K even with selected cipher suites. So, I am looking for alternatives (either symmetric key or public key based). I was thinking about WTLS but looks like its implementation can not be significantly smaller than that of TLS since it is also based on Public Key cryptography (I am wondering how it fits into a cellphone). Can any one tell me what is the approximate size of the client implementation of WTLS. Also, would anyone send some pointers to me regarding what I am looking for. How small of footprint? 50K (presuming you mean in currency) isn't really a measurement of footprint size to me. :) Would something along the lines of a Java iButton URL:http://www.ibutton.com/ match your requirements? It truly depends on what you need the device to be capable of...and I don't just mean the crypto implementation but is this a device to be self-powered? How do you need to interface with it? Etc. The device is a DCT2000 set-top box with very limited footprint. Since the box needs to run a lot of other applications, 50K is the space that we would like to spend on the security purpose. The platform supports C interface. -jr Josh Richards [JTR38/JR539-ARIN] [EMAIL PROTECTED]/cubicle.net/fix.net/freedom.gen.ca.us Geek Research LLC - URL:http://www.geekresearch.com/ IP Network Engineering and Consulting
Re: Bell Case Subpoena
On Tue, Jan 09, 2001 at 02:44:57PM -0800, Tim May wrote: I expect this upcoming trial will not be the case which hinges on these kinds of issues, but some court will someday have to contend with this utter malleability of received mail files. Unlike paper letters which can be forensically analyzed, e-mail is nearly meaningless. Yes and no. Courts have figured out long ago how to deal with malleable computer files, of which email is a special case. And notes allegedly taken during a telephone call or meeting (which were important during the MS antitrust trial) are equally malleable. What the prosecution here is interested in is chain of custody, did you receive this message, can you verify that Exhibit A is what you received from [EMAIL PROTECTED], etc. with perjury as a deterrent. Then they can use phone records to show a defendant was online then via a dialup connection... It strikes me that this is a sort of link padding: If you're online all the time, those phone records will be virtually useless. -Declan
Re: CDR: [alg] gpg with gnome clients (fwd)
Attachment converted: 9main:CDR- [alg] gpg with gnome clien (MiME/CSOm) (00039B4A) The camel's back has just broken. -- A quote from Petro's Archives: ** "As someone who has worked both in private industry and in academia, whenever I hear about academics wanting to teach ethics to people in business, I want to puke."--Thomas Sowell.