Re: [Cryptography] RSA recommends against use of its own products.

2013-10-02 Thread John Lowry
in this chain (with apologies), I too would prefer a standard that that has Postel's principles as a touchstone. John Lowry Sent from my iPhone On Sep 30, 2013, at 0:28, James A. Donald wrote: On 2013-09-29 23:13, Jerry Leichter wrote: BTW, the *idea* behind DER isn't

Re: Quantum Key Distribution: the bad idea that won't die...

2010-04-22 Thread John Lowry
On Apr 20, 2010, at 11:31 AM, Perry E. Metzger wrote: Via /., I saw the following article on ever higher speed QKD: Very interesting physics, but quite useless in the real world. I wonder why

History, context, QKD and the Internet

2007-06-27 Thread John Lowry
I'm old enough to remember hearing (I've worked at BBN for a long time now) that connecting computers on a large scale just isn't going to work, that I would never need more than 4MB of main memory, etc. Any reader can fill out the rest without my risking being pedantic. I do remember

Re: The best riddle you wil hear today...

2007-05-04 Thread John Lowry
My favorite ...$$M+ohilV14 +xq_G On May 2, 2007, at 2:09 PM, Udhay Shankar N wrote: At 10:27 AM 5/2/2007, Aram Perez wrote: From another list: This was one of my

Re: [Fwd: Re: Non-repudiation (was RE: The PAIN mnemonic)]

2004-01-09 Thread John Lowry
Non-repudiation is really very simple in concept. The ability to prove to a third party that you (or someone else) was party to a transaction. There are a lot of problems regarding who the third party must be, what constitutes proof, etc., etc. In the English common-law system, this is applied

Re: Quantum Crypto

2003-12-20 Thread John Lowry
Perry is absolutely right. There is no point in pursuing this. It might even be analogous to what we now know about computers. We were warned that there would never be a need for more than A half-dozen - after all, they were extremely expensive just to get A few more digits in the logarithm table

Re: quantum hype

2003-09-16 Thread John Lowry
QC is currently a one-time pad distribution mechanism - or at lower rates a key establishment mechanism most suitable for symmetric algorithms. You are correct that authentication is not inherent. Then again, this is also true for classical symmetric and PKI schemes. To be usable, all crypto