Re: Claimed proof of the Riemann Hypothesis released

2004-06-10 Thread J. Bruce Fields
On Wed, Jun 09, 2004 at 04:56:03PM -0400, Perry E. Metzger wrote:
 Actual practical impact on cryptography? Likely zero, even if it turns
 out the proof is correct (which of course we don't know yet), but it
 still is neat for math geeks.

Also, the impact of such a proof is often that it represents a milestone
in understanding a certain piece of theory, so in the long run the ideas
used in the proof may be useful even if the result is no suprise, just
as in the cas of factoring challenges, when the work done to come up
with algorithms that can factor large integers may be important, and the
fact that someone was able to factor an integer of a certain size may
say something about the state of the art, even though nobody will
actually give a hoot what the factors turned out to be.

Of course, who knows about this particular case--apparently this guy has
a history of premature announcements.

--b.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Creativity and security

2006-03-23 Thread J. Bruce Fields
On Thu, Mar 23, 2006 at 08:15:50PM -, Dave Korn wrote:
   So what they've been doing at my local branch of Marks  Spencer for the 
 past few weeks is, at the end of the transaction after the (now always 
 chip'n'pin-based) card reader finishes authorizing your transaction, the 
 cashier at the till asks you whether you actually /want/ the receipt or not; 
 if you say yes, they press a little button and the till prints out the 
 receipt same as ever and they hand it to you, but if you say no they don't 
 press the button, the machine doesn't even bother to print a receipt, and 
 you wander away home, safe in the knowledge that there is no wasted paper 
 and no leak of security information  ...
 
   ... Of course, three seconds after your back is turned, the cashier can 
 still go ahead and press the button anyway, and then /they/ can have your 
 receipt.  With the expiry date on it.  And the last four digits of the card 
 number.  And the name of the card issuer, which allows you to narrow the 
 first four digits down to maybe three or four possible combinations.  OK, 
 10^8 still aint easy, but it's a lot easier than what we started with.

If all that information's printed on the outside of the card, then isn't
this battle kind of lost the moment you hand the card to them?

--b.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Creativity and security

2006-03-24 Thread J. Bruce Fields
On Fri, Mar 24, 2006 at 06:47:07PM -, Dave Korn wrote:
 J. Bruce Fields wrote:
  If all that information's printed on the outside of the card, then
  isn't this battle kind of lost the moment you hand the card to them?
 
 1-  I don't hand it to them.  I put it in the chip-and-pin card reader 
 myself.

Oh, right, sorry, I missed that.

 In any case, even if I hand it to a cashier, it is within my sight 
 at all times.

 2-  If it was really that easy to memorize a name and the equivalent of a 
 23-digit number at a glance without having to write anything down, surely 
 the credit card companies wouldn't need to issue cards in the first place?

Well, obviously there's some gap between what you need to make use of
the card convenient, and what you'd need if you were an attacker willing
to spend some minimum of effort.

   IOW, unless we're talking about a corrupt employee with a photographic 
 memory and telescopic eyes,

Tiny cameras are pretty cheap these days, aren't they?  The employee
would be taking more of a risk at that point though, I guess.

--b.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]