Re: Anyone Remember Zero Knowledge Systems?

2003-09-10 Thread Adam Shostack
On Wed, Sep 10, 2003 at 11:32:29AM -0400, R. A. Hettinga wrote: | | | Cryptonomicon.Net - | | Anyone Remember Zero Knowledge Systems? | Date: Wednesday, September 10 @ 11:15:00 EDT | Topic: Commercial Operations / Services

[Isig] Re: Boston Linux Meeting Wednesday, September 17, 2003 PGP/GnuPG Keysigning Party

2003-09-10 Thread R. A. Hettinga
--- begin forwarded text Status: U From: Jerry Feldman <[EMAIL PROTECTED]> To: BLU <[EMAIL PROTECTED]>, CONE <[EMAIL PROTECTED]>, GNHLUG <[EMAIL PROTECTED]>, ISIG <[EMAIL PROTECTED]>, New England Information Security User Group <[EMAIL PROTECTED]> Organization: Boston Linux and

Re: Is cryptography where security took the wrong branch?

2003-09-10 Thread bmanning
> > At 09:57 AM 9/10/2003 -0700, [EMAIL PROTECTED] wrote: > > ok... does anyone else want to "touch" a secured DNS system > > that has some parts fo the tree fully signed? Its a way to > > get some emperical understanding of how interesting/hard > > it is to hamme

Re: Is cryptography where security took the wrong branch?

2003-09-10 Thread Anne & Lynn Wheeler
At 09:57 AM 9/10/2003 -0700, [EMAIL PROTECTED] wrote: ok... does anyone else want to "touch" a secured DNS system that has some parts fo the tree fully signed? Its a way to get some emperical understanding of how interesting/hard it is to hammer the DNS into a PKI-

Re: fyi: bear/enforcer open-source TCPA project

2003-09-10 Thread Sean Smith
> So this doesn't > work unless you put a "speed limit" on CPU's, and that's ridiculous. Go read about the 4758. CPU speed won't help unless you can crack 2048-bit RSA, or figure out a way around the physical security, or find a flaw in the application. > Yes. Protocol designers have been exp

Re: fyi: bear/enforcer open-source TCPA project

2003-09-10 Thread bear
On Tue, 9 Sep 2003, Sean Smith wrote: >> >> >How can you verify that a remote computer is the "real thing, doing >> >the right thing?" >> >> You cannot. > >Using a high-end secure coprocessor (such as the 4758, but not >with a flawed application) will raise the threshold for the adversary >signi

Re: Anyone Remember Zero Knowledge Systems?

2003-09-10 Thread Damian Gerow
Thus spake R. A. Hettinga ([EMAIL PROTECTED]) [10/09/03 11:51]: > Imagine a world where your file swapping software also included a > Freedom-like client that routed your request through a maze of encrypting > routers. The routers themselves could be placed in different countries. > This could make

Re: Is cryptography where security took the wrong branch?

2003-09-10 Thread bmanning
> > At 03:39 AM 9/10/2003 -0700, [EMAIL PROTECTED] wrote: > > There are some other problems w/ using the DNS. > > No revolkation process. > > DNS caching > > third-party trust (DNS admins != delegation holder) > > Given high value &/or low t

Re: Code breakers crack GSM cellphone encryption

2003-09-10 Thread bear
On Mon, 8 Sep 2003, Dave Emery wrote: > Just to amplify this a bit, does anyone seriously think the >NSA's satellite and embassy based cellphone interception capability is >primarily targeted against - US - GSM calls ? Or that they can >routinely get warrants to listen in using the wired

Anyone Remember Zero Knowledge Systems?

2003-09-10 Thread R. A. Hettinga
Cryptonomicon.Net - Anyone Remember Zero Knowledge Systems? Date: Wednesday, September 10 @ 11:15:00 EDT Topic: Commercial Operations / Services It seems that a day doesn't go by that there's new news about the RIAA sui

Bear: An Open-Source Virtual Secure Coprocessor based on TCPA

2003-09-10 Thread R. A. Hettinga
Papers www.cs.dartmouth.edu/~sws/abstracts/msmw03.shtml Last modified: 08/27/03 11:56:52 AM Rich MacDonald, Sean W. Smith, John Marchesini, Omen Wild. Bear: An Open-Source Virtual Secure Coprocessor based on TCPA Technical Report TR2

Re: Is cryptography where security took the wrong branch?

2003-09-10 Thread Anne & Lynn Wheeler
At 08:14 AM 9/10/2003 -0600, Anne & Lynn Wheeler wrote: entry. We ran into a problem with doing consistent database updates over NFS (network filesystem) because while NFS advertises itself as item potent, most client implementations have this 8k cache that can be stale. fingers typing w/o brain

Re: Is cryptography where security took the wrong branch?

2003-09-10 Thread Anne & Lynn Wheeler
At 03:39 AM 9/10/2003 -0700, [EMAIL PROTECTED] wrote: There are some other problems w/ using the DNS. No revolkation process. DNS caching third-party trust (DNS admins != delegation holder) Since DNS is a online positive list you change t

Re: Is cryptography where security took the wrong branch?

2003-09-10 Thread bmanning
> >certificate requests coming into a CA/PKI can be digitally signed, the > >CA/PKI can retrieve the authoritative authentication public key (for the > >domain name ownership) from the domain name infrastructure and > >authenticate the request eliminating all the identification gorp (and >