In message [EMAIL PROTECTED], Nicolai Moles
-Benfell writes:
Hi,
A number of sources state that the NSA changed the S-Boxes (and reduced the ke
y
size) of IBM's original DES submission, and that these change were made to
strengthen the cipher against differential/linear/?? cryptanalysis.
Does
http://www.computerworld.com/printthis/2004/0,4814,96111,00.html
- Computerworld
Quantum cryptography gets practical
Opinion by Bob Gelfond, MagiQ Technologies Inc.
SEPTEMBER 30, 2004 (COMPUTERWORLD) - In theory and in labs, quantum
cryptography -- cryptography based on the
- sufficient documentation and really transparent provable details so that
users could trust and verify that the hardware and software were doing what
they claimed to be doing and weren't doing anything evil that they didn't
admit to, such as including backdoors or bad random number
Peter Gutmann wrote:
Tinfoil-hat mode.
Agreed, but some people want to be thorough, or pedantic, or paranoid.
At 04:20 AM 9/30/2004, Jonathan Thornburg wrote:
UNDOCUMENTED_EVIL_WIRETAP_MODE can be just about impossible to spot
without full design oversight. Even for a 3DES chip, where supposedly
--- begin forwarded text
To: sec-lists: ;
Cc: [EMAIL PROTECTED]
Subject: CFP: Privacy Enhancing Technologies (PET 2005)
From: George Danezis [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
List-Id: Open NymIP-RG discussion list nymip-rg-interest.nymip.org
List-Post: mailto:[EMAIL PROTECTED]
--- begin forwarded text
Date: Fri, 1 Oct 2004 10:46:39 +0200
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Tor 0.0.9pre1 is out (fwd from [EMAIL PROTECTED])
User-Agent: Mutt/1.4i
Sender: [EMAIL PROTECTED]
From: Roger Dingledine [EMAIL PROTECTED]
Subject: Tor 0.0.9pre1 is
http://www.local6.com/print/3776699/detail.html?use=print
local6.com
'Frustrated' U.S. Cybersecurity Chief Abruptly Resigns
POSTED: 11:32 AM EDT October 1, 2004
WASHINGTON -- The government's cybersecurity chief has abruptly resigned
after one year with the Department of Homeland Security,
http://www.linuxelectrons.com/article.php/20040930201813382
LinuxElectrons -
Reverse DMCA: Copyright Holder Held Liable in Landmark Legal Ruling
Thursday, September 30 2004 @ 08:18 PM
Contributed by: ByteEnable
In a landmark case, a California district court has determined that
Found via the RSS feed for cryptome.org:
http://csrc.nist.gov/publications/drafts.html#sp800-52
NIST is pleased to announce the first public draft of Special Publication
800-52, Guidelines on the Selection and Use of Transport Layer Security.
This document is a guideline for implementing
I've been talking about this for the last decade, and never found a
reference on the web whenever I was thinking about it. Thanks to
Google, it was well within my prodigiously diminished attention span
this morning.
Given the events on the net over the past few years, I figure we
might as well
In a personal interview with Walt Tuchman (IBM at the time, worked for
StorageTek when I met him, now retired) he described the process for
creating the s-boxes. A set of mathematical requirements were created
and candidate s-boxes meeting these requirements would be printed out
on a regular
11 matches
Mail list logo