Quantum Crypto broken again

2008-10-24 Thread [EMAIL PROTECTED]
single-photon detector? is available at http://arxiv.org/ftp/arxiv/papers/0809/0809.3408.pdf. -Michael Heyman - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Adam Savage talks about Mythbuster attempt at RFID

2008-09-02 Thread [EMAIL PROTECTED]
but man that was..Tory still gets a little white when he describes that phone conversation. -Michael - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

RE: road toll transponder hacked

2008-08-26 Thread [EMAIL PROTECTED]
On Tue, Aug 26, 2008 at 9:24 AM, Perry E. Metzger [EMAIL PROTECTED] wrote: http://www.technologyreview.com/Infotech/21301/?a=f From the article: other toll systems, like E-Z Pass and I-Pass, need to be looked at too A couple years ago I got a letter from E-Z Pass a few days after I used my

Re: [p2p-hackers] IETF rejects Obfuscated TCP

2008-08-20 Thread [EMAIL PROTECTED]
Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Voting machine security

2008-08-18 Thread [EMAIL PROTECTED]
On Fri, Aug 15, 2008 at 11:57 AM, John Ioannidis [EMAIL PROTECTED] wrote: This just about sums it up: http://xkcd.com/463/ Only slightly better then suggested by the comic. McAfee anti-virus software was on the servers, not the DRE voting machines themselves. From http

Re: Can we copy trust?

2008-06-03 Thread [EMAIL PROTECTED]
On Mon, Jun 2, 2008 at 12:37 PM, Ed Gerck [EMAIL PROTECTED] wrote: In the essay Better Than Free, Kevin Kelly debates which concepts hold value online, and how to monetize those values. See www.kk.org/thetechnium/archives/2008/01/better_than_fre.php Kelly's point can be very useful: *When

Re: Can we copy trust?

2008-06-03 Thread [EMAIL PROTECTED]
On Tue, Jun 3, 2008 at 1:05 PM, Ed Gerck [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: We see that the trust relationship represented by that SSL cert can be copied without any loss, as many times as you wish My understanding is that an SSL certificate is only a method to carry

Re: 2factor

2008-04-18 Thread [EMAIL PROTECTED]
On Wed, Apr 9, 2008 at 12:59 PM, Leichter, Jerry [EMAIL PROTECTED] wrote: Anyone know anything about a company called 2factor (2factor.com)? They're pushing a system based on symmetric cryptography with, it appears, some kind of trusted authority. Factor of 100 faster than SSL. More secure

Re: 2factor

2008-04-18 Thread [EMAIL PROTECTED]
On Wed, Apr 9, 2008 at 12:59 PM, Leichter, Jerry [EMAIL PROTECTED] wrote: Anyone know anything about a company called 2factor (2factor.com)? They're pushing a system based on symmetric cryptography with, it appears, some kind of trusted authority. Factor of 100 faster than SSL. More secure

Re: [tahoe-dev] Surely M$ can patent this process?

2008-01-30 Thread [EMAIL PROTECTED]
On Jan 27, 2008 11:18 AM, zooko [EMAIL PROTECTED] wrote: [adding Cc: p2p-hackers and cryptography mailing lists as explained below; Please trim your follow-ups as appropriate.] On Jan 26, 2008, at 9:44 PM, Gary Sumner wrote: Surely there must be prior art on this technique to refute

Earliest indication of Prime numbers

2008-01-29 Thread [EMAIL PROTECTED]
unsubscribe cryptography to [EMAIL PROTECTED]

Re: No PAL please, we're British

2007-11-16 Thread [EMAIL PROTECTED]
On Nov 15, 2007 2:55 PM, [EMAIL PROTECTED] wrote: According to this BBC story until fairly recently the British military refused to have PALs on nuclear weapons. [SNIP] From the story: The Bomb is actually armed by inserting a bicycle lock key into the arming switch and turning

Rockville MD e-vote glitch

2007-11-08 Thread [EMAIL PROTECTED]
the matter or walked away from the polls without casting a ballot My house number starts with 3 :-) -Michael Heyman - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Elcomsoft trying to patent faster GPU-based password cracker

2007-10-24 Thread [EMAIL PROTECTED]
List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Bid on a SnakeOil Crypto Algorithm Patent

2007-10-05 Thread [EMAIL PROTECTED]
On 10/4/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: On 10/3/07, Saqib Ali [EMAIL PROTECTED] wrote: [SNIP] or both private keys but that never seems to get mentioned I take it back, there is only one private key but math makes multiple temporary public keys out of it. -Michael

Re: Quantum Cryptography

2007-06-27 Thread [EMAIL PROTECTED]
On 6/25/07, Greg Troxel [EMAIL PROTECTED] wrote: 1) Do you believe the physics? (Most people who know physics seem to.) For those who would like to know a little more about the physics, see: http://www.icfo.es/images/publications/J05-055.pdf, Quantum Cloning, Valerio Scarani, Sofyan

Site has flash file that shows Enigma operation as you type

2007-02-22 Thread [EMAIL PROTECTED]
http://enigmaco.de has a Flash-based example of the Enigma processing with a short history and tutorial. -Michael Heyman - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Private Key Generation from Passwords/phrases

2007-01-16 Thread [EMAIL PROTECTED]
On 1/11/07, Joseph Ashwood [EMAIL PROTECTED] wrote: 112 bits of entropy is 112 bits of entropy...anything else and you're into the world of trying to prove equivalence between entropy and work which work in physics but doesn't work in computation because next year the work level

Re: [Clips] Read two biometrics, get worse results - how it works

2005-10-20 Thread [EMAIL PROTECTED]
On 10/19/05, R.A. Hettinga [EMAIL PROTECTED] wrote: [EDIT] Daugman presents (http://www.cl.cam.ac.uk/users/jgd1000/combine/combine.html) the two rival intuitions, then does the maths. On the one hand, a combination of different tests should improve performance, because more information