Re: RNG quality verification

2006-04-12 Thread Max
Similar site aiming to detect defects in various ciphers and hashes:
http://defectoscopy.com/
...where block ciphers can be compared against stream ciphers,
asymmetric ciphers and hash functions in their quality determined by
the security of each individual component as well as their
combination.

We aim to collect all the existing block ciphers, stream ciphers,
asymmetric ciphers and hash functions under one roof, proving
Shannon's 1949 definition of cipher security to be correct. We also
want to show that cryptanalytic progress of the past few decades has
enabled automated detection of flaws in cryptographic primitives, thus
significantly reducing the amount of time required to determine
security or insecurity of a given cryptographic primitive.

Max

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Creativity and security

2006-04-12 Thread Anne Lynn Wheeler

Anne  Lynn Wheeler wrote:

recent posts mentioning some skimming threats
http://www.garlic.com/~lynn/aadsm22.htm#27 Meccano Trojans coming to
desktop near you


re:
http://www.garlic.com/~lynn#aadsm22.htm#30 Creativity and security

Trial starts on swipe-and-go card; A new smartcard could result in 
shorter queues in the shops

http://www.theage.com.au/news/business/trial-starts-on-swipeandgo-card/2006/04/12/1144521400790.html

the above has the quote:

The card never leaves your hand, ... In fact, it need not even be 
taken out of the wallet, and there is no chance information from the 
card can be skimmed, the most common form of card fraud.


... snip ...

while the earlier reference is to a situation where the crook is using 
their own device for extra swipes, a significant portion of skimming

involve compromised devices that harvest information
http://www.garlic.com/~lynn/subpubkey.html#harvest

as part of a normal transaction. The real issue is whether static data 
is used for authentication and therefor the infrastructure is vulnerable 
to any kind of skimming/harvesting/evesdropping and replay attacks.


a few recent comments about static data exploits for replay attacks
http://www.garlic.com/~lynn/aadsm22.htm#20 FraudWatch - ChipPin, a new 
tenner (USD10)
http://www.garlic.com/~lynn/aadsm22.htm#40 FraudWatch - ChipPin, a new 
tenner (USD10)

http://www.garlic.com/~lynn/2006e.html#10 Caller ID spoofing
http://www.garlic.com/~lynn/2006e.html#30 Debit Cards HACKED now
http://www.garlic.com/~lynn/2006f.html#39 X.509 and ssh

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]