On Fri, 14 May 1999, Adam Back wrote:
Anyone who has done this have a feel for how much work and cost is
involved in obtaining FIPS-140a? Are there samples of successful
applicant's submitted documentation available?
Is this what you mean?
http://www.itl.nist.gov/div897/pubs/fip140-1.htm
We offer several documents from the PECSENC meeting
of February 14, 1999:
1. Agenda
2. Members of PECSENC
3. Memorandum on PECSENC Action Plan
4. Executive Summary, PECSENC Meeting Open Session, March 12, 1999
5. Candid Meeting Comments (backdoor algorithms)
http://jya.com/pecsenc051499.htm
Hans Viens wrote:
Anyone know where a could get a public/private key generator (just like
PGP) but not RSA... DH ??? Well, an algorithm that works with a test main
and free...
OpenSSL?
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html
"My grandfather once told me that there are two
The cost depends greatly on whether you are validating hardware |
firmware |
software, what level of validation you are going for (level 1-4 -- which
corresponds to hardware level 2)
and on how many operating system platforms (secure OS's -- e.g. TCSEC
B1, C2, etc.).
You should try to find a
"Perry E. Metzger" [EMAIL PROTECTED] writes:
EUROPEAN PARLIAMENT WANTS ISPs TO SPY
The European Parliament last Friday passed the Lawful Interception of
Communications council resolution on new technologies -- known as Enfopol --
which requires Internet service providers and telephone
--- begin forwarded text
Subject: Re: MacOS 8.7 Security
Date: Sat, 15 May 1999 20:29:02 -0700
From: Mark Talbot [EMAIL PROTECTED]
To: "Robert Hettinga" [EMAIL PROTECTED], [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
List-Subscribe: mailto:[EMAIL PROTECTED]?subject=subscribe%20mac-crypto
On or
Hans Viens wrote:
Anyone know where a could get a public/private key generator (just like
PGP) but not RSA... DH ??? Well, an algorithm that works with a test main
and free...
GNU Privacy Guard, 'http://www.d.shuttle.de/isil/gnupg/gnupg.html'. This
program is an implementation of the IETF
That's docs from the PECSENC meeting of May 14, 1999.
http://jya.com/pecsenc051499.htm
Does anyone know how the enabling of Fortezza LEAF suppression works? Since you
have to return the cards to the vendor so the LEAF suppression feature can be
added, it looks like there's an uploadable firmware patch available which would
turn off the GAK on any Fortezza card. I'd guess it's
Arnold Reinhold quoted a site containing rumors about upcoming security
features in Mac OS 8.7:
The security features controlling all of this will be very similar to
those used in OS X and are to be considered extremely secure. No external
testing has been applied yet, but Apple sources
Forgive me for lacking further specifics just now, but an anonymous
lawyer friend tells me that the May 11, 1999 edition of the "San
Francisco Daily Journal" reported that a federal district judge
declared a (n unspecified) city's ordinance --forbidding the wearing
of masks, hoods or any
[This just arrived in the list inbox. I'm not exactly sure that it is
particularly interesting, accurate or informative, but unfortunately
because it arrived anonymously I'm not really in a position to ask for
an improved version. Anyway, I decided to forward it. --Perry]
-- Forwarded
-- Forwarded message --
Subject: Crypto Equipment Guide -- Part Three of Three
Date: Mon, 17 May 1999 16:10:30 -0500
SECURE TERMINAL EQUIPMENT
Secure Terminal Equipmet
In v04205112b36652888097@[192.168.248.7], on 05/17/99
at 06:30 PM, Dave Del Torto [EMAIL PROTECTED] said:
Second Question: can anyone cite/remember any other federal court
decision that protects one's right to remain anonymous (other than those
protecting victims or people in federal
14 matches
Mail list logo