http://www.kurzweilai.net/news/frame.html?main=/news/news_single.html?id%3D8471
Quantum cryptography broken
KurzweilAI.net, April 20, 2008
Two Swedish scientsts, Jorgen Cederlof, now of Google, and Jan-Ake
Larsson of Link In a paper published in IEEE Trans. Inf Theory, 54:
1735-1741 (2008), they
Victor Duchovni <[EMAIL PROTECTED]> writes:
> On Fri, Apr 18, 2008 at 08:02:28PM -0700, Allen wrote:
>
>> Granted A5/1 is known to be very weak, but how much weaker than
>> AES-128? Ten orders of magnitude? I haven't a clue ...
>
> This is usually the point where I stop reading. Of course 10 orde
On Fri, Apr 18, 2008 at 08:02:28PM -0700, Allen wrote:
> Granted A5/1 is known to be very weak, but how much weaker than
> AES-128? Ten orders of magnitude? I haven't a clue ...
This is usually the point where I stop reading. Of course 10 orders of
magnitude is ~33 bits, so unless the A5 attacks
In my collection I have :
TextTell - 1983 - Encrypted Text Transmission via Acoustic Coupler to
Telephone mouthpiece ( for Transmission ) and Telephone receiver ( for
Reception )
Forbidden by the (then West) German BKA for showing at CeBIT 1983 fair
at Hannover
Photos on http://picasaweb.goog
On Wed, 16 Apr 2008 14:07:49 -0400
"[EMAIL PROTECTED]" <[EMAIL PROTECTED]> wrote:
> Which seem to be aimed at a drop in replacement for SSL (with a
> working example using Firefox and Apache). They seem to rest on a key
> exchange or agreement based on a shared secret.
As opposed to, say, RFC
If your original mode of operation is secure, then this should be
secure.
The reduction:
Consider algorithm A that tries to break the double encryption mode of
operation (DM) in the IND-CPA setting. We can construct an algorithm
B that tries to break the original mode of operation (OM) in