Surprise! Another serious hole in Diebold voting machines...

2006-05-15 Thread Bill Squier
...okay, not so much surprise. [...] Scientists said Diebold appeared to have opened the hole by making it as easy as possible to upgrade the software inside its machines. The result, said Iowa's Jones, is a violation of federal voting system rules. All of us who have heard the

Re: Piercing network anonymity in real time

2006-05-15 Thread leichter_jerrold
|The Locate appliance sits passively on the network and |analyzes packets in real time to garner ID info from sources |like Active Directory, IM and e-mail traffic, then associates |this data with network information. | | This is really nothing new -- I've been

Re: picking a hash function to be encrypted

2006-05-15 Thread Florian Weimer
* Travis H.: IIUC, protocol design _should_ be easy, you just perform some finite-state analysis and verify that, assuming your primitives are ideal, no protocol-level operations break it. Is this still true if you don't know your actual requirements?

Re: the meaning of linearity, was Re: picking a hash function to be encrypted

2006-05-15 Thread leichter_jerrold
| - Stream ciphers (additive) | | This reminds me, when people talk about linearity with regard to a | function, for example CRCs, exactly what sense of the word do they | mean? I can understand f(x) = ax + b being linear, but how exactly | does XOR get involved, and are there +-linear

Re: the meaning of linearity, was Re: picking a hash function to be encrypted

2006-05-15 Thread Travis H.
On 5/15/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Other than post by a guy - Terry someone or another - on sci.crypt a number of years ago - I've never seen any work in this direction. Is there stuff I'm not aware of? That would probably be Terry Ritter, www.ciphersbyritter.com. He calls

Government using call records to go after reporter's sources.

2006-05-15 Thread Perry E. Metzger
One of ABC News' reporters says that he's been warned that call records, possibly even the ones that the major telecom companies are now routinely turning over to the NSA, are being used to track down the sources for reporters at several major news services.

Re: picking a hash function to be encrypted

2006-05-15 Thread Hal Finney
Travis H. writes: Excellent point. When I wrote that I had strongly universal hashes in mind, like UMAC, where the hash is chosen from a family of functions based on some secret data shared by sender and recipient. I mistakenly conflated them with ordinary hashes (which they are, once you

Re: the meaning of linearity, was Re: picking a hash function to be encrypted

2006-05-15 Thread James Muir
Travis H. wrote: - Stream ciphers (additive) This reminds me, when people talk about linearity with regard to a function, for example CRCs, exactly what sense of the word do they mean? I can understand f(x) = ax + b being linear, but how exactly does XOR get involved, and are there +-linear