Re: password strengthening: salt vs. IVs

2007-11-01 Thread silky
On Oct 30, 2007 6:24 AM, <[EMAIL PROTECTED]> wrote: > So back in the bad old days when hashing was DES encryption of the > zero vector with a fixed key, someone came up with salt as a password > strengthening mechanism. > > I'm not quite sure why it was called salt. > > It perturbed the S-boxes in

Fwd: [funsec] "Loophole in Windows Random Number Generator" (slashdot)

2007-11-13 Thread silky
-- Forwarded message -- From: Paul Vixie <[EMAIL PROTECTED]> Date: Nov 13, 2007 10:06 AM Subject: [funsec] "Loophole in Windows Random Number Generator" (slashdot) To: [EMAIL PROTECTED] "A security loophole in the pseudo-random number generator used by Windows was recently detaile

Re: PlayStation 3 predicts next US president

2007-12-11 Thread silky
On Dec 11, 2007 5:06 AM, Allen <[EMAIL PROTECTED]> wrote: > What puzzles me in all this long and rather arcane discussion is > why isn't the solution of using a double hash - MD5 *and* SHA > whatever. The odds of find a double collision go way up. > > Some open source software people are already do

Re: Solving password problems one at a time, Re: The password-reset paradox

2009-02-23 Thread silky
attacks to a > connection reliability problem that is easily solved today. > > This approach of solving password problems one at a time, shows that the > "big problem" of passwords is now reduced to rather trivial data management > functions -- no longer u

Re: Solving password problems one at a time, Re: The password-reset paradox

2009-02-24 Thread silky
Obviously it must have information to 'attack' a given account, because you used it to generate something. The function you used did something, so you can repeat it if you have all the inputs. > Sorry if it wasn't clear. Please have a second reading. Indeed. > Cheers, >

Re: Solving password problems one at a time, Re: The password-reset paradox

2009-02-24 Thread silky
doesn't matter. The user enters the usercode! So they enter it into the phishing site which passes the call along. -- noon silky http://www.boxofgoodfeelings.com/ - The Cryptography Mailing List Unsubscribe by sending "

Re: Warning! New cryptographic modes!

2009-05-21 Thread silky
On Tue, May 12, 2009 at 10:39 AM, Jerry Leichter wrote: > On May 11, 2009, at 8:27 PM, silky wrote: > > > > The local version needs access to the last committed file (to compare > > the changes) and the server version only keeps the 'base' file and the > >

Re: Warning! New cryptographic modes!

2009-05-21 Thread silky
l point in file changes, it can just upload the entire file new again, and replace it's "base" copy and all the "parts". Slightly more difficult with binary files where the changes are spread out over the file, but if these changes can still be "summarised&quo

Re: Warning! New cryptographic modes!

2009-05-21 Thread silky
On Tue, May 12, 2009 at 10:22 AM, Jerry Leichter wrote: > On May 11, 2009, at 7:06 PM, silky wrote: > > How about this. > > > > When you modify a file, the backup system attempts to see if it can > > summarise your modifications into a file that is, say, less th

Re: What will happen to your crypto keys when you die?

2009-07-02 Thread silky
nths and make it public. As long as you are constantly changing your key, no-one will decrypt it in time, but assuming you do die, they can potentially decrypt it while arranging your funeral :) > > Udhay > -- > ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.diger

Re: What will happen to your crypto keys when you die?

2009-07-04 Thread silky
On Fri, Jul 3, 2009 at 4:37 AM, Jack Lloyd wrote: > On Thu, Jul 02, 2009 at 09:29:30AM +1000, silky wrote: > > A potentially amusing/silly solution would be to have one strong key > > that you change monthly, and then, encrypt *that* key, with a method > > that will be brute-

Re: Trusted timestamping

2009-10-05 Thread silky
y not have seen (I didn't see you mention it: http://www.itconsult.co.uk/stamper/stampinf.htm), form what I've noticed (just in passing) this seems to be the most popular stamping service. > Thanks, > Alex -- noon silky http://www.mirios.com.au/ http://skillsforvilla.tumbl

Re: Quantum Key Distribution: the bad idea that won't die...

2010-04-21 Thread silky
ity community, quantum key distribution continues to be a subject > of active technological development. > > Perry -- silky http://www.programmingbranch.com/ - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Re: Quantum Key Distribution: the bad idea that won't die...

2010-04-21 Thread silky
Importantly, however, is that if a classical system is used to do authentication, then the resulting QKD stream is *stronger* than the classically-encrypted scheme. > So, what did QKD > provide you with again? > > There is no p

Re: Quantum Key Distribution: the bad idea that won't die...

2010-04-21 Thread silky
st round of QKD, even if it is only computationally secure, then subsequent rounds of QKD will be information-theoretically secure." > Perry > -- > Perry E. Metzger                pe...@piermont.com -- silky http://www.programmingbranch.com/ - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Re: Quantum Key Distribution: the bad idea that won't die...

2010-04-21 Thread silky
QKD system *after* authentication is *stronger* than classical, due to the OTP. If what you meant to say was "it is broken if authentication is broken" then the answer is obviously "yes". But the strength, in cryptographic terms, is clearly better. > Perry > -- > Perry E. Metzger                pe...@piermont.com -- silky http://www.programmingbranch.com/ - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Re: English 19-year-old jailed for refusal to disclose decryption key

2010-10-06 Thread silky
agnetic-media hard disk? > > http://www.bbc.co.uk/news/uk-england-11479831 > >                                Bear -- silky http://dnoondt.wordpress.com/ "Every morning when I wake up, I experience an exquisite joy — the joy of being this signature." ---