Re: (Short) Intro and question

2007-01-08 Thread Steven M. Bellovin
On Sat, 06 Jan 2007 13:13:32 -0800 Allen [EMAIL PROTECTED] wrote: Hi everyone, I'm Allen Schaaf and I'm primarily an information security analyst - I try to look at things like a total stranger and ask all the dumb questions hoping to stumble on one or two that hadn't been asked before

Re: (Short) Intro and question

2007-01-08 Thread Ivan Krstić
Allen wrote: One of the questions that I have been raising is trust and how to ensure that that it is not misplaced or eroded over time. Which leads me to my question for the list: I can see easily how to do split key for 2 out of x for key recovery, but I can't seem to find a reference to the

Re: (Short) Intro and question

2007-01-08 Thread Saqib Ali
I think you are looking for the m of n solution, or commonly known as shared secret which can be implemented using shamir's or blakley's scheme. you can find a open source implementation of shamir's scheme @ http://point-at-infinity.org// or more info check out the wikipedia entry:

Re: (Short) Intro and question

2007-01-08 Thread Chris Kuethe
On 1/6/07, Allen [EMAIL PROTECTED] wrote: One of the questions that I have been raising is trust and how to ensure that that it is not misplaced or eroded over time. Which leads me to my question for the list: I can see easily how to do split key for 2 out of x for key recovery, but I can't seem

Re: secure CRNGs and FIPS (Re: How important is FIPS 140-2 Level 1 cert?)

2007-01-08 Thread Matthias Bruestle
Adam Back wrote: About the criticisms of Common Critera evaluation in general, I think why people complain it is a documentation exercise is because pretty much all it does ensure that it does what it says it does. So basically you have to enumerates threats, state what threats the system is

[EMAIL PROTECTED]: [fc-announce] FC07: Preliminary program and call for participation]

2007-01-08 Thread R. Hirschfeld
From: Sven Dietrich [EMAIL PROTECTED] Subject: [fc-announce] FC07: Preliminary program and call for participation To: [EMAIL PROTECTED] Date: Mon, 8 Jan 2007 08:08:09 -0500 (EST) Dear Colleague, Please see below for the preliminary program and call for participation for Financial

[EMAIL PROTECTED]: [fc-announce] Usable Security--Prelim Program--Jan 8 Hotel Deadline]

2007-01-08 Thread R. Hirschfeld
From: Rachna Dhamija [EMAIL PROTECTED] Subject: [fc-announce] Usable Security--Prelim Program--Jan 8 Hotel Deadline To: [EMAIL PROTECTED] Date: Fri, 5 Jan 2007 11:45:31 -0800 Below is the preliminary program for Usable Security, a workshop that will be held in conjunction with FC07. Note that

Re: Tamperproof, yet playing Tetris.

2007-01-08 Thread Anne Lynn Wheeler
... and has now made slashdot Chip PIN Terminal Playing Tetris http://hardware.slashdot.org/hardware/07/01/08/1355221.shtml previous post http://www.garlic.com/~lynn/aadsm26.htm#20 Tamperproof, yet playing Tetris recent related comments http://www.garlic.com/~lynn/aadsm26.htm#21 FC07