question re practical use of secret sharing

2007-06-21 Thread Charles Jackson
A quick question. Is anyone aware of a commercial product that implements secret sharing? If so, can I get a pointer to some product literature? Chuck Jackson - The Cryptography Mailing List Unsubscribe by sending "unsubscrib

RE: How the Greek cellphone network was tapped.

2007-07-19 Thread Charles Jackson
An earlier post, talking about vulnerabilities and the lack of an appropriate market response, said: We're talking about phone calls -- did all of the well-publicized cellular eavesdropping (Prince Charles, Newt Gingrich (then a major US politician), and more) prompt a change? Well, t

RE: New DoD encryption mandate

2007-08-15 Thread Charles Jackson
Also interesting is the requirement that all DOD computers include TPM (1.2 or higher). See next to last paragraph of the memorandum at http://iase.disa.mil/policy-guidance/dod-dar-tpm-decree07-03-07.pdf This memo was pointed to by the story referenced below. Chuck Jackson -Original Mess

RE: Another Snake Oil Candidate

2007-09-13 Thread Charles Jackson
I looked at the Ironkey website and, although there is obviously a little marketing-speak, my snake-oil and BS detectors do not go off. Some of the criticisms by Aram Perez appear to be somewhat unjustified. Perez states: "Protected by a password that is entered on whatever PC you plug the Ir

RE: flavors of reptile lubricant, was Another Snake Oil Candidate

2007-09-13 Thread Charles Jackson
Well, I don't want to start a flame war (drop me a note offline if I'm coming across as doing so), but I do want to respond to one point. Ali Saqib wrote: > I don't like the "Military Grade AES Encryption" phrase that IronDrive > uses on their website, cause that implies they know what Military

Schneier interviewed by Dubner

2007-12-05 Thread Charles Jackson
Pointed out by slashdot. http://freakonomics.blogs.nytimes.com/2007/12/04/bruce-schneier-blazes-throu gh-your-questions/ - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

RE: Death of antivirus software imminent

2008-01-02 Thread Charles Jackson
One virtualization approach that I have not see mentioned on this thread is to run the virtual machine on a more secure OS than is used by the applications of interest. For example, one could run VMware on SELinux and use VMware to host Windows/Vista. Thus, even if a virus subverts Windows it s

Center for Cryptologic History at the National Security Agency: Schorreck Memorial Lecture

2008-03-21 Thread Charles Jackson
Professor Christopher Andrew to present Schorreck Memorial Lecture, April 7, 2008 at 2:00 PM, Laurel, MD The Center for Cryptologic History at the National Security Agency is pleased to announce a lecture by Professor Christopher Andrew of Cambridge University, author of numerous books on intellig

Article in Globe and Mail re ATM security

2008-07-02 Thread Charles Jackson
I don't recall seeing any discussion of this article on the list. http://www.theglobeandmail.com/servlet/story/RTGAM.20080702.wgtatmbreach0702 /BNStory/Technology/?page=rss&id=RTGAM.20080702.wgtatmbreach0702 Chuck Jackson [Moderator's note: when forwarding links, please include some indicat

NSA history

2008-11-14 Thread Charles Jackson
Here's a pointer to the new release http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/index.htm - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

WSJ Story on NSA history

2008-11-14 Thread Charles Jackson
http://online.wsj.com/article/SB122660908325125509.html - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

RE: CPRNGs are still an issue.

2008-12-17 Thread Charles Jackson
-Michael Heyman Wrote: Before we give up on using drive timings [as an entropy source], does anyone have evidence to verify this assertion [that SSD drives will have much less variation in read/write timing]? The reviews I have seen using tools like HD Tune and HD Tach seem to show timing noise r

Physical security rather than crypto---but perhaps of interest

2009-07-14 Thread Charles Jackson
http://news.bbc.co.uk/2/hi/technology/8147534.stm Chuck [Moderator's note: It is helpful, when posting a link, to give enough information that people can know whether they want to go and read the article. In this case, the title and first few sentences are: Snooping through the power socket

Re: [Cryptography] tamper-evident crypto? (was: BULLRUN)

2013-09-05 Thread Charles Jackson
On Thu, Sep 5, 2013 at 9:18 PM, Peter Gutmann wrote: > >To say the same thing the other way, I was always amazed that the Nazis > were > >unable to figure out that their crypto was broken during WWII. There were > >experiments they could have done, such as sending out a few U-boats under > >stric