Algorithm Disclosure of and Practical Attack against DECT Standard Cipher

2010-04-14 Thread Dustin D. Trammell
hen a CUDA graphics adapter is available." https://dedected.org/trac/raw-attachment/wiki/DSC-Analysis/FSE2010-166.pdf This is from FSE 2010 in February, but I hadn't seen it mentioned here yet. -- Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc. signature.asc Descr

Microsoft Windows Cryptographic Next Generation SDK 2.0 Released

2009-04-30 Thread Dustin D. Trammell
-49DB-A98B-0CED7CB8FF6F -- Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc. signature.asc Description: This is a digitally signed message part

SHA-1 collisions now 2^52

2009-04-30 Thread Dustin D. Trammell
e the boomerang attack can be used with maximum effect. Paper will appear on eprint soon." http://ping.fm/uCVUM -- Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc. signature.asc Description: This is a digitally signed message part

MD5 considered harmful today, SHA-1 considered harmful tomorrow

2009-01-09 Thread Dustin D. Trammell
t moving directly to at least SHA-2 (until the winner of the NIST hash competition is known), these vendors are likely setting themselves up for similar attacks in the (relatively) near future. [1] http://csrc.nist.gov/groups/ST/toolkit/secure_hashing.html [2] http://www.cryptography.com/cnews/

Re: road toll transponder hacked

2008-08-26 Thread Dustin D. Trammell
On Tue, 2008-08-26 at 13:22 -0400, Ken Buchanan wrote: > On Tue, Aug 26, 2008 at 11:56 AM, Dustin D. Trammell > <[EMAIL PROTECTED]> wrote: > > This is the same for the state-wide Texas tag, TxTag[1]. If your tag > > doesn't register, or you disable or remove

Re: road toll transponder hacked

2008-08-26 Thread Dustin D. Trammell
ate and vehicle registration. If you're not in the TxTag system at all, they simply mail you a bill. [1] http://www.txtag.org/ -- Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc. signature.asc Description: This is a digitally signed message part

Re: The MD6 hash function (rough notes)

2008-08-22 Thread Dustin D. Trammell
est-TheMD6HashFunction.ppt -- Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc. signature.asc Description: This is a digitally signed message part

Re: The MD6 hash function (rough notes)

2008-08-22 Thread Dustin D. Trammell
cis/theses/crutchfield-masters-thesis.pdf It's titled 'Security Proofs for the MD6 Hash Function Mode of Operation' by Christopher Yale Crutchfield (certified by Ronald L. Rivest). I thought it might be of interest to the followers of this thread. -- Dustin D. Trammell Security R

Experimental demonstration of Shor’s algorithm with quantum entanglement

2007-09-13 Thread Dustin D. Trammell
Also from the NewScientist article that I just posted, another paper from completely different researchers arriving at the same result: http://arxiv.org/pdf/0705.1398 -- Dustin D. Trammell Product Security Analyst TippingPoint, a division of 3Com signature.asc Description: This is a digitally

Demonstration of Shor’s quantum factoring algorithm using photonic qubits

2007-09-13 Thread Dustin D. Trammell
NewScientist's write-up (subscription required for full article): http://technology.newscientist.com/article.ns?id=mg19526216.700 You can find the full paper here: http://arxiv.org/pdf/0705.1684 -- Dustin D. Trammell Product Security Analyst TippingPoint, a division of 3Com signatur