Re: my periodic rant on quantum crypto

2004-04-14 Thread David Honig
At 03:37 PM 4/12/04 -0400, Perry E. Metzger wrote: QC can only run over a dedicated fiber over a short run, where more normal mechanisms can work fine over any sort of medium -- copper, the PSTN, the internet, etc, and can operate without distance limitation. Nice essay. I especially liked the

Cryptonomicon.Net - Key Splitting : First (and Second) Person Key Escrow

2004-04-14 Thread R. A. Hettinga
http://www.cryptonomicon.net/modules.php?name=Newsfile=printsid=742 Key Splitting : First (and Second) Person Key Escrow Date: Monday, April 12 @ 08:00:00 EDT Topic: Algorithms / Asymmetric Cipher One of our missions here at Cryptonomicon.Net is to advocate the use of appropriate

Re: [Mac_crypto] Apple should use SHA! (or stronger) to authenticate software releases

2004-04-14 Thread Andy Isaacson
On Mon, Apr 12, 2004 at 06:00:26PM -0700, Joseph Ashwood wrote: From: Nicko van Someren [EMAIL PROTECTED] It's not clear to me that you need all this complexity. All you need if to arrange that the attacker does not know exactly what will be signed until it has been signed. So you

DRM of the mirror universe

2004-04-14 Thread Jani Nurminen
Hello, I had this idea about reversing the roles of the actors in a typical DRM system, and thinking about where it might lead. I hope the idea will stimulate some discussion: is the idea dead on arrival? Does it have merit? Is it feasible? Is there something like this being built today? Here

Re: TCFS available for NetBSD-1.6.2

2004-04-14 Thread Ivan Krstic
VaX#n8 wrote: I've done a survey of the various crypting file system tools, would anyone be interested in a summary of available options? This would likely be an interesting read for many on the list. Perhaps you can put up a PDF somewhere? Cheers, Ivan

AES suitable for protecting Top Secret information

2004-04-14 Thread Steve Bellovin
I haven't seen this mentioned on the list, so I thought I'd toss it out. According to http://www.nstissc.gov/Assets/pdf/fact%20sheet.pdf , AES is acceptable for protecting Top Secret data. Here's the crucial sentence: The design and strength of all key lengths of the AES algorithm

Re: Definitions of Security?

2004-04-14 Thread Thierry Moreau
[EMAIL PROTECTED] wrote: Hi, I'm looking for interesting and unusal defitions of the term Security (or secure). I'm fully aware that it is difficult or impossible to give a precise, compact, and universal definitions, and some book authors explicitely say so. However, there are definitions (or

Re: DRM of the mirror universe

2004-04-14 Thread Paul A.S. Ward
Jani Nurminen wrote: [...] But what content could the consumer-become-content-provider, the ordinary person, you or me (let's call this actor the user), produce? What could be interesting and rare for the corporation but found in abundance from the user? One answer is personal data. Upon

Re: Definitions of Security?

2004-04-14 Thread Lars Eilebrecht
According to [EMAIL PROTECTED]: I'm looking for interesting and unusal defitions of the term Security (or secure). See http://en.wikipedia.org/wiki/Security ciao... -- Lars Eilebrecht [EMAIL PROTECTED] - The Cryptography

Re: Definitions of Security?

2004-04-14 Thread Anne Lynn Wheeler
At 08:01 AM 4/14/2004, [EMAIL PROTECTED] wrote: Hi, I'm looking for interesting and unusal defitions of the term Security (or secure) there was a discussion on PAIN taxonomy for security earlier in the year ... misc. references http://www.garlic.com/~lynn/aadsm17.htm#3 Non-repudiation (was RE:

Re: DRM of the mirror universe

2004-04-14 Thread Barney Wolff
On Tue, Apr 13, 2004 at 11:05:10PM +0300, Jani Nurminen wrote: But what content could the consumer-become-content-provider, the ordinary person, you or me (let's call this actor the user), produce? What could be interesting and rare for the corporation but found in abundance from the user?

Re: DRM of the mirror universe

2004-04-14 Thread David Wagner
Jani Nurminen wrote: I had this idea about reversing the roles of the actors in a typical DRM system, and thinking about where it might lead. [...] This kind of application of DRM would probably guarantee privacy of the personal data of each individual person, while at the same time allow

Re: AES suitable for protecting Top Secret information

2004-04-14 Thread Vin McLellan
I missed that announcement too -- but Wikipedia, the web-based Free Encyclopedia, caught it! See Wikipedia on AES at: http://en.wikipedia.org/wiki/AES The Wikipedia module on AES Security has a link to the same NSA fact sheet Steve mentioned. I was surprised. I thought, as in so many other