Brian Gladman wrote:
> But a fully byte oriented implementation runs at about 140 cycles/byte
> and here the S-Box substitution step is a significant bottleneck.
> ...
> It is also possible that the PPERM instruction could be used to speed up
> the Galois field calculations to produce the S-Box mat
Allen <[EMAIL PROTECTED]> wrote:
> Agreed, but..., well there is the small matter of figuring out /who/ is
> doing it and that just might require some small bit of technology.
Certainly, it is not mutual exclusive. However factor an RSA key
hardly can help with that.
> At least two defects in thi
Leichter, Jerry <[EMAIL PROTECTED]> wrote:
> Computerworld reports:
>
> http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9094818
>
> on a call from Kaspersky Labs for help breaking encryption used by some
> ransomeware: Code that infects a system, uses a public key
On Fri, Apr 25, 2008 at 12:22 AM, Steven M. Bellovin
<[EMAIL PROTECTED]> wrote:
> http://www.nsa.gov/public/crypt_spectrum.cfm
>
I know this is silly but I could not resist to comment on some NSA redacts:
http://www.literatecode.com/2008/04/29/nsaredact/
Ilya
I'm not affiliated with Elcomsoft and don't know their real
intentions, but what they are trying to do is perfectly reasonable.
Once they release a commercial product with such feature it is only a
matter of time until Microsoft or some other patent troll will run for
a patent and start suing. So,
ot;
> doesn't give any real image.
Perhaps, but sometimes rubbish just better be named rubbish without
any metaphorical allusions. For everyone's good.
--
Ilya Levin
http://www.literatecode.com
-
The Cryptography Mail
John Denker <[EMAIL PROTECTED]> wrote:
> So, unless/until somebody comes up with a better metaphor,
> I'd vote for "one-picket fence".
"Nonsense fence" maybe less metaphoric but more clear.
-- -
Ilya O Levin
http://www.literatecode.com