workshop on unwanted Internet traffic

2004-12-09 Thread Steve Bellovin
Readers of this list may be interesting the the SRUTI -- Steps Towards Reducing Unwanted Traffic on the Internet -- workshop. See http://www.research.att.com/~bala/srut for details. --Steve Bellovin, http://www.research.att.com/~smb

Swiss NEMA rotor machine for sale on EBay

2004-06-28 Thread Steve Bellovin
http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItemitem=2252451747ssPageName=ADME:B:SS:US:1 I'm sure we'll see the usual complaints about people being unable to view it... --Steve Bellovin, http://www.research.att.com/~smb

CAs for spies?

2004-05-25 Thread Steve Bellovin
) in a certificate issued by Thawte. The connection itself used 256-bit AES. --Steve Bellovin, http://www.research.att.com/~smb - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL

The EU pursues quantum crypto because of Echelon

2004-05-25 Thread Steve Bellovin
http://www.computerworld.com/securitytopics/security/story/0,10801,93220,00.html?from=homeheads I'm not sure what more to say, given my opinion of the general utility of quantum crypto --Steve Bellovin, http://www.research.att.com/~smb

AES suitable for protecting Top Secret information

2004-04-14 Thread Steve Bellovin
., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths. --Steve Bellovin, http://www.research.att.com/~smb

Spy Letters from the American Revolution

2004-04-02 Thread Steve Bellovin
Readers of this list may be interested in http://www.si.umich.edu/spies/ - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

safety of Pohlig-Hellman with a common modulus?

2003-12-06 Thread Steve Bellovin
.) --Steve Bellovin, http://www.research.att.com/~smb - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

yahoo to use public key technology for anti-spam

2003-12-06 Thread Steve Bellovin
http://edition.cnn.com/2003/TECH/internet/12/05/spam.yahoo.reut/ - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Additional Proposed Hash Function (Forwarded)

2003-12-04 Thread Steve Bellovin
-224, that is based on SHA-256. The change notice is available at http://csrc.nist.gov/publications/drafts.html. NIST requests comments for the change notice by January 16, 2004. Comments should be addressed to [EMAIL PROTECTED] --Steve Bellovin, http://www.research.att.com

traffic analysis of phone calls?

2003-07-12 Thread Steve Bellovin
cartels in the 1990s were using massive mainframe computer systems to analyse telephone billing records they had 'borrowed' from phone companies to find out which people in their cartels were on the blower to Colombian police and US agents. --Steve Bellovin, http