Re: 307 digit number factored

2007-10-10 Thread Nate Lawson
[EMAIL PROTECTED] wrote: > On Mon, May 21, 2007 at 04:32:10PM -0400, Victor Duchovni wrote: >> On Mon, May 21, 2007 at 02:44:28PM -0400, Perry E. Metzger wrote: >>> My take: clearly, 1024 bits is no longer sufficient for RSA use for >>> high value applications, though this has been on the horizon f

Re: Trillian Secure IM

2007-10-10 Thread ji
[EMAIL PROTECTED] wrote: Why bother with all this? There is OTP for gaim, and it works just fine (not to mention it comes from a definitely clueful source). /ji I meant, of course, OTR (off-the-record). And to think that I was using it in another window as I was typing this! Thanks to

Re: kernel-level key management subsystem

2007-10-10 Thread travis+ml-cryptography
On Tue, Oct 09, 2007 at 06:08:44PM +1300, Peter Gutmann wrote: > how do you want access to the keys controlled? ACLs? Who sets the ACLs? Who > can manage them? How are permissions managed? What's the UI for this? Under > what conditions is sharing allowed? If sharing is allowed, how do you h

Re: 307 digit number factored

2007-10-10 Thread travis+ml-cryptography
On Mon, May 21, 2007 at 04:32:10PM -0400, Victor Duchovni wrote: > On Mon, May 21, 2007 at 02:44:28PM -0400, Perry E. Metzger wrote: > > My take: clearly, 1024 bits is no longer sufficient for RSA use for > > high value applications, though this has been on the horizon for some > > time. Presumably

Fixing the current process

2007-10-10 Thread Paul Hoffman
At 10:55 PM +0200 10/8/07, Ian G wrote: A slightly off-topic question: if we accept that current processes (FIPS-140, CC, etc) are inadequate indicators of quality for OSS products, is there something that can be done about it? Highly doubtful. The institutional inertia at DoD/NIST is too gre

Re: Full Disk Encryption solutions selected for US Government use

2007-10-10 Thread Ali, Saqib
> Out of curiousity, Vista (BitLocker) was not mentioned? BitLocker lacks centralized management, and has very limited key recovery capability. Also it is limited to Vista Business or Ultimate Edition. BitLocker, if you are not using a external USB device to store the key, falls back to volume le

Re: kernel-level key management subsystem

2007-10-10 Thread Peter Gutmann
[EMAIL PROTECTED] writes: >On Mon, May 21, 2007 at 01:44:23PM +1200, Peter Gutmann wrote: >> >Ignoring special-purpose hardware, does anyone have thoughts on what the >> >requirements for a kernel-level key management subsystem should be? >> >> Yes, but first you'd have to tell me what you're tryin

RE: Trillian Secure IM

2007-10-10 Thread Alex Pankratov
> -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Leichter, Jerry > Sent: Monday, October 08, 2007 11:48 AM > To: Alex Pankratov > Cc: cryptography@metzdowd.com > Subject: RE: Trillian Secure IM > > | > But, opportunistic cryptography is even more

RE: Trillian Secure IM

2007-10-10 Thread Alex Pankratov
> -Original Message- > From: pgut001 [mailto:[EMAIL PROTECTED] > Sent: Monday, October 08, 2007 7:52 PM > To: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Cc: cryptography@metzdowd.com > Subject: Re: Trillian Secure IM > > Marcos el Ruptor <[EMAIL PROTECTED]> writes: > > >I found those thre

Re: Trillian Secure IM

2007-10-10 Thread Peter Gutmann
Marcos el Ruptor <[EMAIL PROTECTED]> writes: >I found those threads: > >http://forums.ceruleanstudios.com/showthread.php?t=53433 > >http://forums.ceruleanstudios.com/showthread.php?t=56207 One of them contains a link to an older thread: http://www.ceruleanstudios.com/forums/showthread.php?s=&thr

Re: Full Disk Encryption solutions selected for US Government use

2007-10-10 Thread james hughes
On Oct 8, 2007, at 4:27 AM, Steven M. Bellovin wrote: On Mon, 18 Jun 2007 22:57:36 -0700 "Ali, Saqib" <[EMAIL PROTECTED]> wrote: US Government has select 9 security vendors that will product drive and file level encryption software. See: http://security-basics.blogspot.com/2007/06/fde-fde-so

Re: Full Disk Encryption solutions selected for US Government use

2007-10-10 Thread Peter Gutmann
Stephan Somogyi <[EMAIL PROTECTED]> writes: >FIPS 140(-2) is about validating cryptographic implementations. It is not >about certifying entire products that contain ample functionality well >outside the scope of cryptographic evaluation. That's more of a Common >Criteria thing. Not necessarily.

Re: Trillian Secure IM

2007-10-10 Thread Peter Gutmann
Ian G <[EMAIL PROTECTED]> writes: >Peter Gutmann wrote: >> "Alex Pankratov" <[EMAIL PROTECTED]> writes: >>> SecureIM handshake between two version 3.1 (latest) clients takes about .. >>> 48 >>> bytes. That's altogether, 32 bytes in one direction, and 16 in another. And >>> that's between the clien

Re: Full Disk Encryption solutions selected for US Government use

2007-10-10 Thread Leichter, Jerry
| A slightly off-topic question: if we accept that current processes | (FIPS-140, CC, etc) are inadequate indicators of quality for OSS | products, is there something that can be done about it? Is there a | reasonable criteria / process that can be built that is more suitable? Well, if you believ

Re: kernel-level key management subsystem

2007-10-10 Thread travis+ml-cryptography
On Mon, May 21, 2007 at 01:44:23PM +1200, Peter Gutmann wrote: > >Ignoring special-purpose hardware, does anyone have thoughts on what the > >requirements for a kernel-level key management subsystem should be? > > Yes, but first you'd have to tell me what you're trying to do. Protect keys in kern

Re: Trillian Secure IM

2007-10-10 Thread ji
Why bother with all this? There is OTP for gaim, and it works just fine (not to mention it comes from a definitely clueful source). /ji - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMA

Re: Full Disk Encryption solutions selected for US Government use

2007-10-10 Thread lists
On 8 Oct 2007 10:12:58 -0700, Stephan Somogyi wrote: > At 02:11 +1300 09.10.2007, Peter Gutmann wrote: > >> But if you build a FDE product with it you've got to get the entire product >> certified, not just the crypto component. > > I don't believe this to be the case. > > FIPS 140(-2) is about