For all those interested in EKE, A-EKE, and related methods,
the next P1363 meeting (May 31, Boston) will discuss the creation of
a new standard for Password-based Authenticated Key Exchange.
The P1363 home page is http://grouper.ieee.org/groups/1363.
The joint kick-off document for this effort
At 11:42 AM 05/10/2000 +0200, Sergio Tabanelli wrote:
Perhaps this can be out of topic, but recently I was involved in a
discussion on metods to generate strong password starting from easy to
remember word or sentence, there I proposed to use a private key to encrypt
easy to remember words. Is
In message [EMAIL PROTECTED], Paul C
rowley writes:
Rick Smith [EMAIL PROTECTED] writes:
If you can control the risk of off-line attacks (i.e. theft of the password
file) then attackers are stuck performing on-line attacks. The system under
attack can usually detect on-line attacks and take
At 11:42 AM 05/10/2000 +0200, Sergio Tabanelli wrote:
Perhaps this can be out of topic, but recently I was involved in a
discussion on metods to generate strong password starting from easy to
remember word or sentence, there I proposed to use a private key to encrypt
easy to remember words. Is
-Original Message-
From: [EMAIL PROTECTED] [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED] [EMAIL PROTECTED]; [EMAIL PROTECTED]
[EMAIL PROTECTED]
Date: martedì 9 maggio 2000 21.46
Subject: Re: Automatic passphrase generation
-BEGIN PGP SIGNED MESSAGE
-BEGIN PGP SIGNED MESSAGE-
Steve Reid [EMAIL PROTECTED] wrote:
This is not nearly as good as I had hoped. Does anyone have any
suggestions for producing output that is more correct english? I'm
wondering if maybe the lexicon I'm using isn't so good. Or maybe my
knowledge of
On Sun, 30 Apr 2000, Rich Salz wrote:
For a bit of whimsy, I posted a program in 1989 to comp.sources.games
that generated sonnets. Might be of interest. You can find it
at ftp.uu.net/usenet/comp.sources.games/volume6/sonnet/part0[12].Z
As for the passphrase generation you can take a look
At 05:05 PM 04/30/2000 -0700, Steve Reid wrote:
Below is some sample output. The amount of entropy per passphrase should
be more than 89 bits, or almost the same as seven Diceware words.
However, if you generate N passphrases and pick the one that is easiest
to remember then you should subtract
On Tue, May 02, 2000 at 10:14:14AM -0500, Rick Smith wrote:
Is it really necessary to protect against an attack that orders the phrases
according to how easy they are to remember? Clearly, a practical brute
force attack against the passphrases must be automated. But I don't know of
an
proposed it but I think the example passphrase given was "the happy duck
slowly kisses the yellow book".
A la Chomsky: "Colorless green ideas sleep furiously." :)
For a bit of whimsy, I posted a program in 1989 to comp.sources.games
that generated sonnets. Might be of interest. You can
10 matches
Mail list logo