Always collecting examples of "secret signatures"
that predate all the stuff we do, I offer this for
your amusement/pleasure.
--dan
==
"Marion Dorset," Progressive Farmer, November 1999, p31.
His solution to hog cholera saved
Earlier this week, I posted a note about an attack on the recently
published CSS cipher, used for encrypting DVDs.
I published my first attack here:
http://livid.on.openprojects.net/pipermail/livid-dev/1999-October/000589.html
It has a workload 2^16 and recovers the 40 bits CSS key with 6 known
Thanks to Anonymous we offer the CAPSTONE (MYK-80)
Specifications, August, 1995, about 1/3 redacted of parts
still classified TOP SECRET UMBRA:
http://cryptome.org/capstone.htm (40K text and 13 images)
Or Zipped:
http://cryptome.org/capstone.zip (text and images: 298K)
This doc was
The actual decision is readable here. Personally I side with the
dissent.
http://www.ce9.uscourts.gov/web/newopinions.nsf/f606ac175e010d64882566eb00658118/b686f731840272eb882567e7005de14a?OpenDocument
Forwarded-by: Jim Warren [EMAIL PROTECTED]
From: [EMAIL PROTECTED] (Johnny King)
WESTERN
--- begin forwarded text
Date: Sun, 31 Oct 1999 16:29:20 -0800
From: Lucky Green [EMAIL PROTECTED]
Old-Subject: Must-read capabilities paper
To: "cypherpunks@Algebra. COM" [EMAIL PROTECTED]
Subject: Must-read capabilities paper
Sender: [EMAIL PROTECTED]
Reply-To: Lucky Green [EMAIL PROTECTED]
[from ntk]
Just when you thought you'd wait forever for a free DVD
player, along come two cracks at once. The first was the
leaking onto the Linux LIVID player mailing list of the DVD
Content Scrambling System code used by the Jon Johansen's
cracker
At 1:55 PM -0600 on 10/29/99, EDUCAUSE wrote:
ACTIVISTS DECRY BILLS ON 'DIGITAL SIGNATURE'
Consumer groups are up in arms over two bills in Congress, the
Millennium Digital Commerce Act and the Electronic Signatures in
Global and National Commerce Act, that would give digital
signatures
Anybody know more?
http://www.wired.com/news/print/0,1294,32267,00.html
Nov 1: Marc Collins-Rector, 39, stepped down as chairman of DEN last
week, citing a desire to devote more time to his new startup, a
digital encryption firm.
On Mon, 1 Nov 1999, Arnold G. Reinhold wrote:
Key lengths are perhaps the easiest parameter for a manufacturer to
change at a later date. Incorporating a useful and usable
cryptographic architecture is much harder. Apple deserves credit for
taking a serious stab at the later.
I realize