Re: [Cryptography] PGP Key Signing parties

2013-10-10 Thread Paul Hoffman
to work on that around 1998, they might still have some of that design around. --Paul Hoffman ___ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography

Re: [Cryptography] RSA equivalent key length/strength

2013-10-02 Thread Paul Crowley
On 30 September 2013 23:35, John Kelsey crypto@gmail.com wrote: If there is a weak curve class of greater than about 2^{80} that NSA knew about 15 years ago and were sure nobody were ever going to find that weak curve class and exploit it to break classified communications protected by

Re: [Cryptography] People should turn on PFS in TLS (was Re: Fwd: NYTimes.com: N.S.A. Foils Much Internet Encryption)

2013-09-17 Thread Paul Crowley
At a stretch, one can imagine circumstances in which trying multiple seeds to choose a curve would lead to an attack that we would not easily replicate. I don't suggest that this is really what happened; I'm just trying to work out whether it's possible. Suppose you can easily break an elliptic

Re: [Cryptography] RSA equivalent key length/strength

2013-09-14 Thread Paul Hoffman
Also see RFC 3766 from almost a decade ago; it has stood up fairly well. --Paul Hoffman ___ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography

Re: [Cryptography] [cryptography] very little is missing for working BTNS in Openswan

2013-09-13 Thread Paul Wouters
[all your normal X.509 authentication stuff] Merging these into one, is exactly why we got transport mode, authenticated header,IKEv2 narrowing and a bunch of BTNS drafts no one uses. Stop making crypto harder! Paul ___ The cryptography mailing list

Re: [Cryptography] Squaring Zooko's triangle

2013-09-11 Thread Paul Crowley
From the title it sounds like you're talking about my 2007 proposal: http://www.lshift.net/blog/2007/11/10/squaring-zookos-triangle http://www.lshift.net/blog/2007/11/21/squaring-zookos-triangle-part-two This uses key stretching to increase the work of generating a colliding identifier from 2^64

Re: [Cryptography] Is DNSSEC is really the right solution? [djb video]

2013-09-09 Thread Paul Wouters
technical arguments, and not with video hype. And I'll gladly take the time to explain things. Paul ___ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography

Re: [Cryptography] Google's Public Key Size (was Re: NSA and cryptanalysis)

2013-09-05 Thread Paul Hoffman
On Sep 4, 2013, at 2:15 PM, Andy Steingruebl stein...@gmail.com wrote: As of Jan-2014 CAs are forbidden from issuing/signing anything less than 2048 certs. For some value of forbidden. :-) --Paul Hoffman ___ The cryptography mailing list

Re: Disk encryption advice...

2010-10-08 Thread Paul Wouters
(and requires an admin when it would reboot), yet the Windows based VM's would need no disk encryption supported whatsoever. My laptop for instance is running Fedora with whole disk encryption, and I run various Windows VM's that have their image stored on that encrypted disk. Paul

Folly of looking at CA cert lifetimes

2010-09-14 Thread Paul Hoffman
vendor keeps that key, usually in cert form, in its trust anchor pile. You should not extrapolate *anything* from the contents of the CA cert except the key itself and the proclaimed name associated with it. --Paul Hoffman, Director --VPN Consortium

Re: Folly of looking at CA cert lifetimes

2010-09-14 Thread Paul Hoffman
At 5:33 PM -0400 9/14/10, Thor Lancelot Simon wrote: On Tue, Sep 14, 2010 at 08:14:59AM -0700, Paul Hoffman wrote: At 10:57 AM -0400 9/14/10, Perry E. Metzger did not write, but passed on for someone else: This suggests to me that even if NIST is correct that 2048 bit RSA keys

Re: towards https everywhere and strict transport security (was: Has there been a change in US banking regulations recently?)

2010-08-26 Thread Paul Wouters
. It seems to be deciding on certs (not raw keys/hashes) to simplify and re-use the existing TLS based implementations (eg HTTPS) Paul - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord

Re: 2048-bit RSA keys

2010-08-17 Thread Paul Wouters
in DNSSEC, a key can be rolled in a matter of hours or days. Paul - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: 2048-bit RSA keys

2010-08-16 Thread Paul Hoffman
At 11:35 AM +1000 8/16/10, Arash Partow wrote: Paul Hoffman wrote: You are under the wrong impression, unless you are reading vastly different crypto literature than the rest of us are. RSA-1024 *might* be possible to break in public at some point in the next decade, and RSA-2048 is a few

2048-bit RSA keys

2010-08-15 Thread Paul Hoffman
are under the wrong impression, unless you are reading vastly different crypto literature than the rest of us are. RSA-1024 *might* be possible to break in public at some point in the next decade, and RSA-2048 is a few orders of magnitude harder than that. --Paul Hoffman, Director --VPN Consortium

Re: GSM eavesdropping

2010-08-03 Thread Paul Wouters
to reap the benefits from our new infrastructure. Paul - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: /dev/random and virtual systems

2010-08-03 Thread Paul Hoffman
a unique state (because they might start within the same refresh. If you need that, you probably want to automatically mix a microsecond-accurate time at the same time. --Paul Hoffman, Director --VPN Consortium - The Cryptography

Re: /dev/random and virtual systems

2010-08-03 Thread Paul Wouters
. So my question to the list: is this useful? Is this doable with popular systems (e.g. Linux running on VMWare or VirtualBox)? Is this actually being done? Both xen and kvm do not do this currently. It is problematic for servers. Paul

Re: GSM eavesdropping

2010-08-02 Thread Paul Wouters
level. Requesting specific additional records will remove the need for another latency driven DNS lookup to get more crypto information. And obsolete the broken CA model while gaining improved support for SSL certs by removing all those enduser warnings. Paul

Hashing messages with lengths between 32 and 128 bytes is one of the most important practical issue (was Re: the skein hash function)

2010-07-30 Thread Paul
. 57.38 groestl256 20. 66.00 luffa512 21. 87.56 cubehash1632 22. 88.69 echo256 23. 93.56 shavite3512 24. 100.69 groestl512 25. 106.69 fugue256 26. 111.38 echo512 Regards, -- Paul paulcrossb...@123mail.org -- http://www.fastmail.fm - Access all

SHA256 reduced to 112 bits?

2010-07-29 Thread Paul Wouters
Hi, I've heard rumors of an attack on the SHA-2 family reducing complexity of SHA256 to something less or equal of 112 bits. This attack will apparently be announced in a few days - perhaps at Black Hat or Def Con? I would be interested in knowing more. Paul

Re: Persisting /dev/random state across reboots

2010-07-29 Thread Paul Wouters
that there was not enough random left at all. By saving the entropy from a longer run system at shutdown, you increase the entropy of the next boot by adding randomness from the previous state(s) Paul - The Cryptography Mailing List

Re: A mighty fortress is our PKI

2010-07-28 Thread Paul Tiemann
/present/view?id=df9sn445_206ff3kn9gs Great slides! The TOFU/POP is nice, and my favorite concept was to translate every error message into a one sentence, easy-to-understand statement. Paul Tiemann (DigiCert) - The Cryptography

Re: A mighty fortress is our PKI

2010-07-28 Thread Paul Tiemann
--it felt like my chance to talk to a rock star. All the best, Paul Tiemann (DigiCert) - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: A mighty fortress is our PKI, Part II

2010-07-28 Thread Paul Tiemann
that base themselves on CRL. Paul Tiemann (DigiCert) - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: A mighty fortress is our PKI, Part II

2010-07-27 Thread Paul Tiemann
, would the bad guy be able to backdate the signature? Paul Tiemann (DigiCert) - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: A mighty fortress is our PKI

2010-07-27 Thread Paul Tiemann
operations from more perspectives than just dollars and cents. When I read that nist.gov link, the joke about the spherical cow popped into my head. Paul Tiemann (DigiCert) - The Cryptography Mailing List Unsubscribe by sending

Re: A mighty fortress is our PKI

2010-07-27 Thread Paul Tiemann
money. Looks like at least one site is out there: http://ie6update.com/ but has no Paypal donate button, and doesn't offer newcomers the reasons they should switch to something more modern. Maybe this is too utopian. But laughing does work, sometimes. Paul Tiemann (DigiCert

Re: A mighty fortress is our PKI

2010-07-27 Thread Paul Tiemann
around when this happened, but maybe revoking for Key compromise was considered just as good. And maybe it's rare enough not to need its own special if() statement in all the browsers. The browsers don't really do different things based on the reason code anyway (to my knowledge) Paul

Re: A mighty fortress is our PKI

2010-07-27 Thread Paul Tiemann
not actually sure what the fix would be for this, or even if there is a fix that needs to be made. Thus the hope to get it discussed on the list. Well, if nothing else, the smaller certificates might at least help whatever PKI library was getting the segv. Paul Tiemann (DigiCert

Re: A mighty fortress is our PKI

2010-07-25 Thread Paul Tiemann
to participate in the discussion. We're very open to considering the risks, and not afraid to make changes based on feedback like this. From my call with Edgecast I can tell you they feel the same way, and they're willing to make changes to improve. All the best, Paul Tiemann CTO, DigiCert, Inc

Re: Fw: Root Zone DNSSEC Deployment Technical Status Update

2010-07-17 Thread Paul Wouters
On Fri, 16 Jul 2010, Taral wrote: Neat, but not (yet) useful... only these TLDs have DS records: The rest will follow soon. And it is not that you had to stop those TLD trust anchors just now. Several are using old SHA-1 hashes... old ? Paul

Re: Root Zone DNSSEC Deployment Technical Status Update

2010-07-17 Thread Paul Hoffman
. insert chide about your criticism of the exact shade of red used on the curtains in the theater --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord

Re: Intel to also add RNG

2010-07-12 Thread Paul Wouters
. The article lists NIST having done tests, but does not mention any CPU model where this is on. Anyone knows? Paul - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: Intel to also add RNG

2010-07-12 Thread Paul Wouters
with an HWRNG on die. It's been shipping for years. Paul - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: [cryptography] What's the state of the art in factorization?

2010-07-09 Thread Paul Crowley
reduction to the discrete log problem in exactly the way that Schnorr does. -- __ \/ o\ Paul Crowley, p...@ciphergoth.org /\__/ http://www.ciphergoth.org/ - The Cryptography Mailing List Unsubscribe by sending unsubscribe

Re: Quantum Key Distribution: the bad idea that won't die...

2010-04-20 Thread Paul Hoffman
, and there is money to be thrown down the drain^w^w^wat them, there will be active development. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord

Re: Possibly questionable security decisions in DNS root management

2009-10-14 Thread Paul Hoffman
? --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Trusted Time Stamping

2009-10-07 Thread Paul F. Doyle
will be a linear function. --Paul - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: SHA-1 and Git

2009-08-25 Thread Paul Hoffman
changes needed when one algorithm fails is low. Later software updates that contain other changes can also include new algorithms that are suspected to be good even if all of the original ones fail. --Paul Hoffman, Director --VPN Consortium

Re: Certainty

2009-08-23 Thread Paul Hoffman
At 7:10 PM -0700 8/19/09, james hughes wrote: On Aug 19, 2009, at 3:28 PM, Paul Hoffman wrote: I understand that creaking is not a technical cryptography term, but certainly is. When do we become certain that devastating attacks on one feature of hash functions (collision resistance) have any

Certainty

2009-08-19 Thread Paul Hoffman
without any hint of preimage attacks, the less certain I am that collision attacks are even related to preimage attacks. Of course, I still believe in hash algorithm agility: regardless of how preimage attacks will be found, we need to be able to deal with them immediately. --Paul Hoffman

Re: Crypto '09 rump session summary?

2009-08-19 Thread Paul Hoffman
At 2:46 PM -0700 8/19/09, Greg Rose wrote: ...some summaries of some of the presentations... More like this, please! The rump sessions have a lot of value (beyond the often-strained attempts at humor). --Paul Hoffman, Director --VPN Consortium

Re: 112-bit prime ECDLP solved

2009-07-20 Thread Paul Hoffman
At 7:54 AM -0600 7/18/09, Zooko Wilcox-O'Hearn wrote: This involves deciding whether a 192-bit elliptic curve public key is strong enough... Why not just go with 256-bit EC (128-bit symmetric strength)? Is the 8 bytes per signature the issue, or the extra compute time? --Paul Hoffman, Director

RE: HSM outage causes root CA key loss

2009-07-14 Thread Paul Hoffman
At 11:09 PM +0200 7/14/09, Weger, B.M.M. de wrote: Any other problems? Maybe something with key rollover or interoperability? Bingo. Key rollover has been thinly tested in relying parties. --Paul Hoffman, Director --VPN Consortium

Re: MD6 withdrawn from SHA-3 competition

2009-07-06 Thread Paul Hoffman
definition, and they can't make MD6 work within that definition. But that doesn't mean that NIST wouldn't have accepted the fast-enough MD6 with a proof from someone else. --Paul Hoffman, Director --VPN Consortium - The Cryptography

Re: MD6 withdrawn from SHA-3 competition

2009-07-05 Thread Paul Hoffman
or not NIST would really rely on the proofs. It was clear they didn't want to withdraw MD6, but that they felt like they had to because of the speed requirement. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing

Re: Factoring attack against RSA based on Pollard's Rho

2009-06-07 Thread Paul Hoffman
* 1024) of brute force? That is a silly reduction; reducing it to anything less than the estimate for NFS (about 80 bits) is not useful. Or, can this attack be combined with NFS? Or...? --Paul Hoffman, Director --VPN Consortium

End-of-chapter questions for Practical Cryptography?

2009-05-22 Thread Paul Hoffman
on this list used the book to teach a class? If so, did you create a list of discussion questions? Or, do people know profs who have used the book to teach? Any pointers are appreciated. --Paul Hoffman - The Cryptography Mailing

Re: 80-bit security? (Was: Re: SHA-1 collisions now at 2^{52}?)

2009-05-08 Thread Paul Hoffman
on this list and in the press are sloppy about security decisions that involve periods of time longer than about a year. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe

Re: Has any public CA ever had their certificate revoked?

2009-05-08 Thread Paul Hoffman
At 6:02 PM +0200 5/8/09, R. Hirschfeld wrote: Date: Tue, 5 May 2009 10:17:00 -0700 From: Paul Hoffman paul.hoff...@vpnc.org the CA fixed the problem and researched all related problems that it could find. From what I've read of the incident (I think it's the one referred to), Comodo

Re: Has any public CA ever had their certificate revoked?

2009-05-06 Thread Paul Hoffman
At 1:02 AM +1200 5/7/09, Peter Gutmann wrote: Paul Hoffman paul.hoff...@vpnc.org writes: Peter, you really need more detents on the knob for your hyperbole setting. nothing happened is flat-out wrong: the CA fixed the problem and researched all related problems that it could find. Perhaps you

Re: Has any public CA ever had their certificate revoked?

2009-05-05 Thread Paul Hoffman
should be ready to answer who will benefit from the punishment and in what way should the CA be punished. (You don't have to answer these, of course: you can just mete out punishment because it makes you feel good and powerful. There is lots of history of that.) --Paul Hoffman, Director --VPN

Re: Has any public CA ever had their certificate revoked?

2009-05-05 Thread Paul Hoffman
At 6:44 PM -0400 5/5/09, Jerry Leichter wrote: On May 5, 2009, at 1:17 PM, Paul Hoffman wrote: ...This leads to the question: if a CA in a trust anchor pile does something wrong (terribly wrong, in this case) and fixes it, should they be punished? If you say yes, you should be ready to answer

Re: full-disk encryption standards released

2009-01-29 Thread Paul Crowley
time seeing where the actual cryptography is specified. They mention that they use AES but I can't see where they tell us what mode of operation they are using. -- __ \/ o\ Paul Crowley /\__/ www.ciphergoth.org

Re: Obama's secure PDA

2009-01-26 Thread Paul Hoffman
on security issues. http://gcn.com/articles/2009/01/23/obama-gets-super-secure-smartphone.aspx I too would like to hear more information on this, particularly the crypto that is known to be used on the Edge. --Paul Hoffman, Director --VPN Consortium

Re: MD5 considered harmful today, SHA-1 considered harmful tomorrow

2009-01-20 Thread Paul Hoffman
that there is a straight-line loss of bits, you would have to be believing that the attack is much worse for SHA2/384 than it was for SHA2/256 in order to bring the output down to the level that I need. --Paul Hoffman, Director --VPN Consortium

Re: Security by asking the drunk whether he's drunk

2009-01-02 Thread Paul Hoffman
. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: CPRNGs are still an issue.

2008-12-16 Thread Paul Crowley
? -- __ \/ o\ Paul Crowley /\__/ www.ciphergoth.org - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: TLS Server Name Indication and IDNA?

2008-10-24 Thread Paul Hoffman
the pain is avoided: Yes+. That's why we designed IDNA that way. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Cube cryptanalysis?

2008-09-14 Thread Paul Hoffman
At 11:08 AM -0700 8/21/08, Greg Rose wrote: Adi mentioned that the slides and paper will go online around the deadline for Eurocrypt submission; it will all become much clearer than my wounded explanations then. There now: http://eprint.iacr.org/2008/385 --Paul Hoffman, Director --VPN

Re: once more, with feeling.

2008-09-10 Thread Paul Hoffman
is that people who have more stake in the game (Mozilla Inc.) have spent longer thinking about this than we give them credit for and come to the design decisions that they have. --Paul Hoffman, Director --VPN Consortium - The Cryptography

Re: once more, with feeling.

2008-09-08 Thread Paul Hoffman
have similarly poor security. Knowing this, do you wish to continue anyway? --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: SRP implementation - choices for N and g

2008-08-26 Thread Paul Crowley
application-wide? What are the (security-related) implications in each case? They can safely be chosen application-wide, so long as they are secure choices as per the Group parameter agreement section of the SRP spec. -- __ \/ o\ Paul Crowley, [EMAIL PROTECTED] /\__/ http://www.ciphergoth.org

5x speedup for AES using SSE5?

2008-08-23 Thread Paul Crowley
. However, glancing through the SSE5 specification, I can't see at all how such a dramatic speedup might be achieved. Does anyone know any more, or can anyone see more than I can in the spec? http://developer.amd.com/cpu/SSE5/Pages/default.aspx -- __ \/ o\ Paul Crowley /\__/ www.ciphergoth.org

Re: Voting machine security

2008-08-18 Thread Paul Hoffman
that is is quite expensive. I suspect that nearly everyone in the country would be happy to pay an additional $1/election for more reliable results. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List

Re: OpenID/Debian PRNG/DNS Cache poisoning advisory

2008-08-08 Thread Paul Hoffman
. I understand most current browsers support OCSP. ...and only a tiny number of CAs do so. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL

Re: Kaminsky finds DNS exploit

2008-07-14 Thread Paul Hoffman
to above), code changes and a universal rollout in all DNS software (which you allude to at the end), and stable rollout of the DNSSEC trust anchor system in every significant zone and all resolvers. FWIW, only the latter has anything to do with this mailing list... --Paul Hoffman, Director

Re: Kaminsky finds DNS exploit

2008-07-09 Thread Paul Hoffman
make nearly as much difference as a diligent security expert with a good name. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Strength in Complexity?

2008-07-02 Thread Paul Hoffman
of opacity. So, I agree with Peter that that article is probably correct about protocols. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Protection mail at rest

2008-06-02 Thread Paul Hoffman
uncomplicated, modulo initial setup. And, if you want to host on FreeBSD instead of Linux, see http://www.rootbsd.net/. Same price, good service. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe

Re: The perils of security tools

2008-05-22 Thread Paul Hoffman
At 10:25 AM +0100 5/15/08, Ben Laurie wrote: Paul Hoffman wrote: I'm confused about two statements here: At 2:10 PM +0100 5/13/08, Ben Laurie wrote: The result of this is that for the last two years (from Debian's Edgy release until now), anyone doing pretty much any crypto on Debian

Re: The perils of security tools

2008-05-22 Thread Paul Hoffman
More interesting threadage about the issue here: http://taint.org/2008/05/13/153959a.html, particularly in the comments. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending

Re: SSL/TLS and port 587

2008-01-23 Thread Paul Hoffman
? It seems like a pretty flimsy straw man. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: SSL/TLS and port 587

2008-01-23 Thread Paul Hoffman
that SSL/TLS can protect email privacy, That's not what I asked, of course. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Fixing the current process

2007-10-10 Thread Paul Hoffman
and the other two could wither over the ensuing decades. If we're lucky. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: debunking snake oil

2007-09-02 Thread Paul Walker
show anything, but I'm probably using the wrong terms. Do you have references for this that I could have a look at? Thanks, -- Paul - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL

Re: more SHA-1 progress?

2007-08-22 Thread Paul Hoffman
from last week. I watched the webcast of the rump session, and Christian Rechberger said that they think they will get 2^60ish with a new technique. He did not describe the technique in any detail. Offline, he has told me that there will be papers published. --Paul Hoffman, Director --VPN

Re: Fwd: Potential SHA 1 Hack Using Distributed Computing - Near Miss(es) May be Good Enough

2007-08-15 Thread Paul Hoffman
new cryptanalytic methods... sounds great, but is meaningless without specifics. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Fwd: Potential SHA 1 Hack Using Distributed Computing - Near Miss(es) May be Good Enough

2007-08-14 Thread Paul Hoffman
, or what. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: New article on root certificate problems with Windows

2007-07-21 Thread Paul Hoffman
At 7:58 PM +1200 7/20/07, [EMAIL PROTECTED] wrote: Paul Hoffman [EMAIL PROTECTED] writes: At 2:45 AM +1200 7/20/07, [EMAIL PROTECTED] wrote: |From a security point of view, this is really bad. From a usability point of |view, it's necessary. As you can see from my list of proposed solutions

Re: New article on root certificate problems with Windows

2007-07-19 Thread Paul Hoffman
are about to put it back in. Note that I did not criticize the practice of starting with a zillion roots that Microsoft trusts. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending

Re: Quantum Cryptography

2007-07-03 Thread Paul Hoffman
the cost of the end boxes for still-useful DH. Oh, and all the above is ignoring that DH works over multiple hops of different media, and quantum crypto doesn't (yet, maybe ever). --Paul Hoffman, Director --VPN Consortium

Re: ad hoc IPsec or similiar

2007-06-26 Thread Paul Hoffman
At 2:49 PM -0500 6/26/07, Nicolas Williams wrote: On Fri, Jun 22, 2007 at 10:43:16AM -0700, Paul Hoffman wrote: This was discussed many times, and always rejected as not good enough by the purists. Then the IETF created the BTNS Working Group which is spending huge amounts of time getting

Re: ad hoc IPsec or similiar

2007-06-26 Thread Paul Hoffman
this other actually secure stuff). Whereas I was in the camp of liking the name very much for the very reason that this thread was started: because it lets you encrypt an arbitrary conversation with essentially no startup cost. --Paul Hoffman, Director --VPN Consortium

Re: Quantum Cryptography

2007-06-22 Thread Paul Hoffman
the attacker has the ability to perform 2^128 or more operations, which he doesn't. Which part of the word useless is not apparent here? --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending

Re: ad hoc IPsec or similiar

2007-06-22 Thread Paul Hoffman
by the purists. Then the IETF created the BTNS Working Group which is spending huge amounts of time getting close to purity again. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe

Re: Quantum Cryptography

2007-06-22 Thread Paul Hoffman
At 10:44 AM -0700 6/22/07, Ali, Saqib wrote: ...whereas the key distribution systems we have aren't affected by eavesdropping unless the attacker has the ability to perform 2^128 or more operations, which he doesn't. Paul: Here you are assuming that key exchange has already taken place

SSL certificates for SMTP

2007-05-24 Thread Paul Hoffman
years ago. As far as I know, there isn't even a way to store mail routing information in X.509 certificates. Why would you need to? SMTP-over-TLS only identifies the system to whom you are speaking. No routing inforation is needed or wanted. --Paul Hoffman, Director --VPN Consortium

Re: 307 digit number factored

2007-05-23 Thread Paul Hoffman
For the math weenies on the list, see the full announcement here: http://listserv.nodak.edu/cgi-bin/wa.exe?A2=ind0705L=nmbrthryT=0P=1019. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe

Re: 307 digit number factored

2007-05-22 Thread Paul Hoffman
migration. That's good of you not to expect it, given that zero of the major CAs seem to support ECC certs today, and even if they did, those certs would not work in IE on XP. --Paul Hoffman, Director --VPN Consortium

Re: 0wned .gov machines (was Re: Russian cyberwar against Estonia?)

2007-05-21 Thread Paul Hoffman
on those machines. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: More info in my AES128-CBC question

2007-04-22 Thread Paul Hoffman
professionals without any negative consequences? Because doing so can get things finished earlier and/or make a more efficient protocol. Same as it ever was. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List

Re: DNSSEC to be strangled at birth.

2007-04-06 Thread Paul Hoffman
At 7:26 PM -0400 4/5/07, Thor Lancelot Simon wrote: On Thu, Apr 05, 2007 at 07:32:09AM -0700, Paul Hoffman wrote: Control: The root signing key only controls the contents of the root, not any level below the root. That is, of course, false, This is, of course false. In order to control

Re: DNSSEC to be strangled at birth.

2007-04-06 Thread Paul Hoffman
At 7:54 PM -0400 4/5/07, Thor Lancelot Simon wrote: On Thu, Apr 05, 2007 at 04:49:33PM -0700, Paul Hoffman wrote: because, with it, one can sign the appropriate chain of keys to forge records for any zone one likes. If the owner of any key signs below their level, it is immediately

Re: DNSSEC to be strangled at birth.

2007-04-06 Thread Paul Hoffman
/ months will be spent finger-pointing instead of fixing. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: DNSSEC to be strangled at birth.

2007-04-05 Thread Paul Hoffman
in the ISP community even before this event: many are not sure they trust ICANN itself, much less its current sponsor. Note that I'm not supporting the US signing the root in the least. I'm just saying that predicting doom is grossly premature. /anti-rant --Paul Hoffman, Director --VPN Consortium

Re: more on NIST hash competition

2007-01-26 Thread Paul Hoffman
after SHA-1 needs to stop being used. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: more on NIST hash competition

2007-01-25 Thread Paul Hoffman
are in the second group. It looks like NIST sided with the first group, but it will be interesting if the folks in the second group are vocal during the coming few years. --Paul Hoffman, Director --VPN Consortium

Re: SC-based link encryption

2007-01-05 Thread Paul Hoffman
it down one layer in the stack. At least that way you'll know the security properties of what you create. --Paul Hoffman, Director --VPN Consortium - The Cryptography Mailing List Unsubscribe by sending unsubscribe

  1   2   >