Re: English 19-year-old jailed for refusal to disclose decryption key

2010-10-06 Thread silky
                               Bear -- silky http://dnoondt.wordpress.com/ Every morning when I wake up, I experience an exquisite joy — the joy of being this signature. - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography

Re: Quantum Key Distribution: the bad idea that won't die...

2010-04-21 Thread silky
distribution continues to be a subject of active technological development. Perry -- silky http://www.programmingbranch.com/ - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: Quantum Key Distribution: the bad idea that won't die...

2010-04-21 Thread silky
Key Distribution If authentication is unbroken during the first round of QKD, even if it is only computationally secure, then subsequent rounds of QKD will be information-theoretically secure. Perry -- Perry E. Metzger                pe...@piermont.com -- silky http

Re: Quantum Key Distribution: the bad idea that won't die...

2010-04-21 Thread silky
...@piermont.com -- silky http://www.programmingbranch.com/ - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: Trusted timestamping

2009-10-05 Thread silky
to be the most popular stamping service. Thanks, Alex -- noon silky http://www.mirios.com.au/ http://skillsforvilla.tumblr.com/ - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord

Re: What will happen to your crypto keys when you die?

2009-07-04 Thread silky
On Fri, Jul 3, 2009 at 4:37 AM, Jack Lloydll...@randombit.net wrote: On Thu, Jul 02, 2009 at 09:29:30AM +1000, silky wrote: A potentially amusing/silly solution would be to have one strong key that you change monthly, and then, encrypt *that* key, with a method that will be brute-forceable

Re: What will happen to your crypto keys when you die?

2009-07-02 Thread silky
as you are constantly changing your key, no-one will decrypt it in time, but assuming you do die, they can potentially decrypt it while arranging your funeral :) Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) -- noon silky http://lets.coozi.com.au

Re: Warning! New cryptographic modes!

2009-05-21 Thread silky
On Tue, May 12, 2009 at 10:39 AM, Jerry Leichter leich...@lrw.com wrote: On May 11, 2009, at 8:27 PM, silky wrote: The local version needs access to the last committed file (to compare the changes) and the server version only keeps the 'base' file and the 'changes' subsets. a)  What's

Re: Warning! New cryptographic modes!

2009-05-21 Thread silky
changes, it can just upload the entire file new again, and replace it's base copy and all the parts. Slightly more difficult with binary files where the changes are spread out over the file, but if these changes can still be summarised relatively trivially, it should work. -- silky

Re: Warning! New cryptographic modes!

2009-05-21 Thread silky
On Tue, May 12, 2009 at 10:22 AM, Jerry Leichter leich...@lrw.com wrote: On May 11, 2009, at 7:06 PM, silky wrote: How about this. When you modify a file, the backup system attempts to see if it can summarise your modifications into a file that is, say, less then 50% of the file size

Re: Solving password problems one at a time, Re: The password-reset paradox

2009-02-24 Thread silky
something, so you can repeat it if you have all the inputs. Sorry if it wasn't clear. Please have a second reading. Indeed. Cheers, Ed Gerck -- noon silky http://www.boxofgoodfeelings.com/ - The Cryptography Mailing List

Re: Solving password problems one at a time, Re: The password-reset paradox

2009-02-24 Thread silky
is that it doesn't matter. The user enters the usercode! So they enter it into the phishing site which passes the call along. -- noon silky http://www.boxofgoodfeelings.com/ - The Cryptography Mailing List Unsubscribe by sending unsubscribe

Re: Solving password problems one at a time, Re: The password-reset paradox

2009-02-23 Thread silky
facing usability restrictions is what has prevented success so far. Comments are welcome. More at www.Saas-ST.com Stop spamming? Best regards, Ed Gerck e...@gerck.com -- noon silky http://www.boxofgoodfeelings.com

Re: PlayStation 3 predicts next US president

2007-12-11 Thread silky
On Dec 11, 2007 5:06 AM, Allen [EMAIL PROTECTED] wrote: What puzzles me in all this long and rather arcane discussion is why isn't the solution of using a double hash - MD5 *and* SHA whatever. The odds of find a double collision go way up. Some open source software people are already doing

Re: password strengthening: salt vs. IVs

2007-11-01 Thread silky
On Oct 30, 2007 6:24 AM, [EMAIL PROTECTED] wrote: So back in the bad old days when hashing was DES encryption of the zero vector with a fixed key, someone came up with salt as a password strengthening mechanism. I'm not quite sure why it was called salt. It perturbed the S-boxes in DES