Re: CPRNGs are still an issue.

2008-12-16 Thread
On Thu, Dec 11, 2008 at 8:42 PM, Damien Miller wrote: On Thu, 11 Dec 2008, James A. Donald wrote: If one uses a higher resolution counter - sub microsecond - and times multiple disk accesses, one gets true physical randomness, since disk access times are effected by

security fail (from failblog)

2009-05-22 Thread
See -Michael Heyman - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to

Re: Fast MAC algorithms?

2009-07-22 Thread
On Wed, Jul 22, 2009 at 1:43 AM, Nicolas wrote: But that's not what I'm looking for here.  I'm looking for the fastest MACs, with extreme security considerations...In the crypto world one never designs weak-but-fast algorithms on purpose, only

Re: Fast MAC algorithms?

2009-07-23 Thread
On Thu, Jul 23, 2009 at 1:34 AM, Peter wrote: writes: 2) If you throw TCP processing in there, unless you are consistantly going to have packets on the order of at least 1000 bytes, your crypto algorithm is almost _irrelevant_

Hacker Says iPhone 3GS Encryption Is ‘Useless’ f or Businesses

2009-07-24 Thread
From the supposedly enterprise-friendly encryption included with the iPhone 3GS is so weak it can be cracked in two minutes with a few pieces of readily available freeware...“I don’t think any of us [developers] have ever seen

Re: Malware using good crypto

2009-08-04 Thread
On Sat, Aug 1, 2009 at 11:52 PM, Udhay Shankar wrote: Interesting article. Anyone here have experience trying to reverse-engineer malware that uses really good crypto? I haven't done this personally but I have worked with people who do. Typically, the type of encryption isn't

AES in stick figures

2009-09-28 Thread
A Stick Figure Guide to the Advanced Encryption Standard (AES) (A play in 4 acts) -Michael Heyman - The Cryptography Mailing List Unsubscribe by sending

Re: Is this the first ever practically-deployed use of a threshold scheme?

2010-08-11 Thread
On Sun, Aug 1, 2010 at 7:10 AM, Peter Gutmann wrote: ...does anyone know of any significant use [of split keys] by J.Random luser?  I'm interested in this from a usability point of view. Maybe not J.Random but J.Corporate... A few jobs ago back in the late '90s, I