Re: [Cryptography] Snowden "fabricated digital keys" to get access to NSA servers?

2013-06-28 Thread Udhay Shankar N
in place for this, perhaps one might be able to generate a key on demand, with the appropriate access permissions. Udhay [1] http://www.symantec.com/business/support/index?page=content&id=TECH149500 -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) _

1024 bit RSA cracked?

2010-03-16 Thread Udhay Shankar N
up with a solution, which involves a cryptographic technique called salting that involves randomly juggling a private key's digits. The research is funded by the National Science Foundation and the Gigascale Systems Research Center. -- ((Udhay Shankar N)) ((udhay @ p

Re: What will happen to your crypto keys when you die?

2009-07-01 Thread Udhay Shankar N
Udhay Shankar N wrote, [on 5/29/2009 9:02 AM]: > Fascinating discussion at boing boing that will probably be of interest > to this list. > > http://www.boingboing.net/2009/05/27/what-will-happen-to.html Followup article by Cory Doctorow: http://www.guardian.co.uk/technology/2009

Popular explanation of fully homomorphic encryption wanted

2009-06-16 Thread Udhay Shankar N
Symposium on Theory of Computing > (STOC), 2009. I was wondering if anyone on this list could recommend a good, entry-level piece on the Gentry paper referenced above, and its implications. Failing which, anyone wants to take a stab at it? Udhay

What will happen to your crypto keys when you die?

2009-05-29 Thread Udhay Shankar N
Fascinating discussion at boing boing that will probably be of interest to this list. http://www.boingboing.net/2009/05/27/what-will-happen-to.html Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The

Re: privacy in public places

2008-08-30 Thread Udhay Shankar N
Perry E. Metzger wrote, [on 8/28/2008 10:09 PM]: Given this, I think the time for focusing on the privacy implications of payment transponders and fare cars is over. Not carrying a cell phone will not help you avoid tracking when your environment is saturated with cameras. Digital cash toll coll

Kaminsky finds DNS exploit

2008-07-09 Thread Udhay Shankar N
give up the goods at Black Hat in August. That should give folks enough time to patch their systems. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending

Traffic analysis reveals spy satellite details

2008-02-06 Thread Udhay Shankar N
of the satellite spotters who, needing little more than a pair of binoculars, a stop watch and star charts, uncover some of the deepest of the government’s expensive secrets and share them on the Internet. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

Interesting editorial comment on "security" vs. privacy

2008-02-03 Thread Udhay Shankar N
http://www.claybennett.com/pages/security_fence.html - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

using SRAM state as a source of randomness

2007-09-12 Thread Udhay Shankar N
virtual tags, and can potentially produce 128bit random numbers capable of passing cryptographic statistical tests. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by

Hackers target C-level execs and their families

2007-07-05 Thread Udhay Shankar N
. "Certainly, people need to raise the level of vigilance," Sunner said. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Re: A crazy thought?

2007-06-09 Thread Udhay Shankar N
of PGP, this was handled by Zimmermann publishing his public key in the (dead-trees) version of his book. Udhay [1] http://en.wikipedia.org/wiki/Web_of_trust -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) -

Re: The best riddle you wil hear today...

2007-05-02 Thread Udhay Shankar N
At 10:27 AM 5/2/2007, Aram Perez wrote: <http://farm1.static.flickr.com/191/480556169_6d731d2416_o.jpg> From another list: This was one of my faves bits of html from last night Makes a nice flag..fly it -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digerat

Interesting new stego application

2007-03-23 Thread Udhay Shankar N
e technique look perfectly normal but a camera can see the code printed into the image. The technique can currently store just 12 bytes of information - soon to rise to 24 - the equivalent amount of data in a barcode. That data could be a phone number, a message or a website link. -- ((Udha

Startup to launch new random number generator from space

2006-12-21 Thread Udhay Shankar N
nuary, will have many more options, including the ability to give the site a list of choices and have it pick one. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by se

Are laptop search & seizures increasing use of disk crypto?

2006-10-26 Thread Udhay Shankar N
Like the subject says - I'm curious whether the current regime of inspection and "forensic analysis" of laptops, primarily in the US, has affected corporate policies regarding disk crypto. Is there anybody studying this? Any resources available online? Thanks, Udhay -- ((

U. Washington Crypto Course Available Online For Free

2006-06-06 Thread Udhay Shankar N
http://it.slashdot.org/article.pl?sid=06/06/04/1311243 -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

"time reversal acoustics"

2006-04-22 Thread Udhay Shankar N
some surprising characteristics of mediums and frequencies, scientists have gained insight into acoustic time reversal, which could impact applications such as sending confidential messages in cryptography. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratu

Bug found in GPG

2006-03-10 Thread Udhay Shankar N
<http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html>http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html GnuPG does not detect injection of unsigned data... -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digerat

Re: NPR : E-Mail Encryption Rare in Everyday Use

2006-03-01 Thread Udhay Shankar N
gain. :) Does anybody know if there were followups to the Caligula virus, which was a proof-of-concept that stole PGP keyrings? Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing L

The Devil's Infosec Dictionary

2005-08-23 Thread Udhay Shankar N
complex set of mathematical algorithms to sensitive data with the aim of making Bruce Schneier exceedingly rich -- Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List

no visas for Chinese cryptologists

2005-08-17 Thread Udhay Shankar N
Conference, who argued that restrictions originally created to prevent the transfer of advanced technologies from the United States are now having the opposite effect. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

Re: Last WWII Comanche "code talker" dies in Oklahoma

2005-08-02 Thread Udhay Shankar N
ace. One of the code talkers sent the first message of D-Day: "Right beach, wrong place." -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Ostiary

2005-08-02 Thread Udhay Shankar N
ore to start up - I can't afford anything too fancy. * Keep things simple. I'm no crypto expert; I know I'm not capable of coming up with an ssh replacement. So I need to keep things so utterly simple that I can be sure I'm not missing anything important.

Last WWII Comanche "code talker" dies in Oklahoma

2005-08-01 Thread Udhay Shankar N
;s probably scratching his head yet down in his grave." He said they called Nazi dictator Adolph Hitler "posah tai vo" which means "crazy white man." The Germans could not understand them, thus the Comanches were called "code talkers.

Conspiracy Theory O' The Day

2005-01-04 Thread Udhay Shankar N
I just got a batch of spam: perfectly justified blocks of random-looking characters. Makes me wonder if somebody is trying to train Bayesian filters to reject PGP messages. Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

QotD

2004-11-30 Thread Udhay Shankar N
found at http://webpages.charter.net/allanms/2004/07/instant-immortality.html "Amateurs study cryptography; professionals study economics." (Bob Hettinga, this is your cue. :) Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.dig

Electonic Voting

2004-11-06 Thread Udhay Shankar N
lsome and heavily litigated nature of Indian democracy, a lot of us were expecting post-election drama, but only a few, if any, fingers were found pointing. Things didn't fare so well in the United States. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.dig

Re: Public FTP Space (was looking for sites to host my crypto...)

2004-07-15 Thread Udhay Shankar N
At 04:56 AM 7/14/2004, J.A. Terranson wrote: Recently a list member requested public ftp/web space for the hosting of various crypto files. Also see: http://munitions.vipul.net/ For Linux-based crypto software only, AFAIK. Multi-homed, hosted outside the US. Udhay -- ((Udhay Shankar N)) ((udhay

Re: Article on passwords in Wired News

2004-06-05 Thread Udhay Shankar N
dit cards" - basically, a credit card number valid for one use only, which would be ideal for online purchasing. IIRC, the offering was withdrawn because there weren't enough takers. Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) --

Re: ADMIN: 'subscribers only' posting

2004-05-27 Thread Udhay Shankar N
eing sent through remailers. What happens to that? Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Cringely rediscovers the web of trust

2003-10-13 Thread Udhay Shankar N
at the same time, so the real question is what path will give us the most identity for the least loss of privacy or the most privacy with the least amount of identity? -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))

Seth Schoen posts paper on "trusted computing"

2003-10-06 Thread Udhay Shankar N
computer against its owner. In effect, the computer's owner is sometimes treated as just another attacker or adversary who must be prevented from breaking in and altering the computer's software. link: http://www.eff.org/Infra/trusted_computing/20031001_tc.php -- ((Udhay Shankar N)) (

Fwd: [IP] A Simpler, More Personal Key to Protect Online Messages

2003-07-07 Thread Udhay Shankar N
quot;success is getting what you want & happiness is wanting what you get" http://www.nytimes.com/library/tech/99/01/biztech/articles/17drop.html http://www.livejournal.com/users/a2gsg/ -- End of Forwarded Message --

Re: The real problem that https has conspicuously failed to fix

2003-06-11 Thread Udhay Shankar N
containing a username, like above. Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Quantum crypto, from BBC

2003-06-07 Thread Udhay Shankar N
and Industry has pledged cash to help the researchers refine their work and bring commercial quantum cryptography products to market. Dr Shields said commercial products should be ready in three years' time. The researchers will be making their work public at the Conference on