Re: 5x speedup for AES using SSE5?

2008-08-26 Thread Ilya Levin
Brian Gladman wrote: But a fully byte oriented implementation runs at about 140 cycles/byte and here the S-Box substitution step is a significant bottleneck. ... It is also possible that the PPERM instruction could be used to speed up the Galois field calculations to produce the S-Box

Re: Ransomware

2008-06-11 Thread Ilya Levin
Allen [EMAIL PROTECTED] wrote: Agreed, but..., well there is the small matter of figuring out /who/ is doing it and that just might require some small bit of technology. Certainly, it is not mutual exclusive. However factor an RSA key hardly can help with that. At least two defects in this

Re: Ransomware

2008-06-10 Thread Ilya Levin
Leichter, Jerry [EMAIL PROTECTED] wrote: Computerworld reports: http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9094818 on a call from Kaspersky Labs for help breaking encryption used by some ransomeware: Code that infects a system, uses a public key

Re: Declassified NSA publications

2008-04-29 Thread Ilya Levin
On Fri, Apr 25, 2008 at 12:22 AM, Steven M. Bellovin [EMAIL PROTECTED] wrote: http://www.nsa.gov/public/crypt_spectrum.cfm I know this is silly but I could not resist to comment on some NSA redacts: http://www.literatecode.com/2008/04/29/nsaredact/ Ilya

Re: solving the wrong problem

2005-08-09 Thread Ilya Levin
just better be named rubbish without any metaphorical allusions. For everyone's good. -- Ilya Levin http://www.literatecode.com - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: solving the wrong problem

2005-08-07 Thread Ilya Levin
John Denker [EMAIL PROTECTED] wrote: So, unless/until somebody comes up with a better metaphor, I'd vote for one-picket fence. Nonsense fence maybe less metaphoric but more clear. -- - Ilya O Levin http://www.literatecode.com