On Tue, Jul 13, 2010 at 05:46:36PM +1200, Peter Gutmann wrote:
Paul Wouters p...@xelerance.com writes:
Which is what you should do anyway, in case of a hardware failure. I
know the Linux intel-rng and amd-rng used to produce nice series of zeros.
Do you have any more details on this? Was
What's the current state of affairs regarding combined encryption and
authentication modes?
I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I
couldn't find test vectors), but I later came across CCM and EAX. CCM
has the advantage of being NIST-reviewed. EAX can do streaming
On 12 July 2010 18:13, Jack Lloyd ll...@randombit.net wrote:
On Mon, Jul 12, 2010 at 12:22:51PM -0400, Perry E. Metzger wrote:
BTW, let me note that if Intel wanted to gimmick their chips to make
them untrustworthy, there is very little you could do about it. The
literature makes it clear at
On Jul 14, 2010, at 1:52 AM, Florian Weimer wrote:
What's the current state of affairs regarding combined encryption and
authentication modes?
I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I
couldn't find test vectors), but I later came across CCM and EAX. CCM
has the
What's the current state of affairs regarding combined encryption and
authentication modes?
I've implemented draft-mcgrew-aead-aes-cbc-hmac-sha1-01 (I think, I
couldn't find test vectors), but I later came across CCM and EAX. CCM
has the advantage of being NIST-reviewed. EAX can do
Folks on this list may be interested in a new tech report:
Shreyas Srivatsan, Maritza Johnson, and Steven M. Bellovin. Simple-VPN:
Simple IPsec configuration. Technical Report CUCS-020-10, Department of
Computer Science, Columbia University, July 2010.
Forwarded from Dave Farber's list:
From: Paul Levy pl...@citizen.org
Date: July 14, 2010 1:06:10 PM EDT
To: d...@farber.net
Subject: Two new rulings on Internet anonymity
Within a few hours of each other, two significant decisions have
come down on the issue of how to decide whether to