Re: Who cares about side-channel attacks?

2008-10-30 Thread Peter Gutmann
Ben Laurie [EMAIL PROTECTED] writes: Peter Gutmann wrote: Given the string of attacks on crypto in embedded devices (XBox, iPhone, iOpener, Wii, some not-yet-published ones on HDCP devices :-), etc) this is by far the most at-risk category because there's a huge incentive to attack them, the

Re: Who cares about side-channel attacks?

2008-10-30 Thread Thierry Moreau
Peter Gutmann wrote: Ben Laurie [EMAIL PROTECTED] writes: Peter Gutmann wrote: Given the string of attacks on crypto in embedded devices (XBox, iPhone, iOpener, Wii, some not-yet-published ones on HDCP devices :-), etc) this is by far the most at-risk category because there's a huge

Re: the skein hash function

2008-10-30 Thread Bill Stewart
Eugen Leitl and Stephan Somogyi [EMAIL PROTECTED] wrote about the Skein hash function announcement. http://www.schneier.com/blog/archives/2008/10/the_skein_hash.html?1 http://www.schneier.com/skein.html One thing I noticed on a first read-through was a discussion of speed for ASICs vs.

Parallel Skein Hash Construction based on the Subset Sum Problem?

2008-10-30 Thread Matt Ball
On Wed, Oct 29, 2008 at 9:23 AM, Stephan Somogyi wrote: The Skein team has announced its submission to the NIST hash competition: http://www.schneier.com/skein.html Now that we've all had a chance to read the Skein algorithm, I've got a question for the list: Would it be possible to

Donald Knuth stops paying for errata

2008-10-30 Thread Perry E. Metzger
It seems that Donald Knuth had his bank accounts attacked not once but three times using his checking account number off of checks he sent out for bounties for flaws in his books and software, and is thus ending a practice of nearly 40 years. Rather sad. I mark this as another milestone in the