On Wed, Sep 11, 2013 at 12:41 AM, Ben Laurie wrote:
> On 11 September 2013 01:17, Jeffrey Walton wrote:
>>
>> I was reading on a HSM, and the marketing literature stated, "...
>> because it utilizes the Security World architecture, XXX provides an
>> ideal combination of high assurance and operat
On 11 September 2013 01:17, Jeffrey Walton wrote:
> I was reading on a HSM, and the marketing literature stated, "...
> because it utilizes the Security World architecture, XXX provides an
> ideal combination of high assurance and operational ease".
>
> What is "Security World" architecture?
ht
I was reading on a HSM, and the marketing literature stated, "...
because it utilizes the Security World architecture, XXX provides an
ideal combination of high assurance and operational ease".
What is "Security World" architecture? What are the criteria used for
"high assurance" and "operational
2013/9/10 David D
> Quote, " You've got to think (NSA claims to be the biggest employer of
> mathematicians) that seeing the illegal activities the US has been getting
> up to with the fruits of their labour that they may have a mathematician
> retention or motivation problem on their hands."
>
>
Quote, " You've got to think (NSA claims to be the biggest employer of
mathematicians) that seeing the illegal activities the US has been getting
up to with the fruits of their labour that they may have a mathematician
retention or motivation problem on their hands."
You mean like the principled m
You know coincidentally we (the three authors of that paper) were just
talking about that very topic in off-list (and PGP encrypted:) email.
I remain keen on forward-secrecy, and it does seem to be in fashion again
right now.
Personally I think we in the open community need to up our game an ord
Hi all,
i just read about this internet draft "Forward Secrecy Extensions for
OpenPGP" available at
http://tools.ietf.org/html/draft-brown-pgp-pfs-03 .
Is it a still good proposal?
Should it be revamped as an actual improvement of currently existing use
of OpenPGP technology?
--
Fabio Pietros
ProPublica's Jeff Larson on the NSA Crypto Story
http://source.mozillaopennews.org/en-US/articles/propublicas-jeff-larson-nsa-crypto-story/
Describes two months of digging through the Snowden documents, using
search tool Intella, finding code words, looking for references to those,
scrambling to
Security theater. Phony as thinking NSA and national spies
spy from embassies, not the key internet exchanges and
telecom hubs in Frankfurt and other locations around the globe.
This is amply described in a slew of technical reports and popular
articles and books. Although, tellingly, not much di
Feels like naming coincidence, particularly given that the GCHQ
analogue is named similarly. From The Guardian[0]:
"The NSA's codeword for its decryption program, Bullrun, is taken from
a major battle of the American civil war. Its British counterpart,
Edgehill, is named after the first major enga
- Forwarded message from Jerry Leichter -
Date: Tue, 10 Sep 2013 07:42:55 -0400
From: Jerry Leichter
To: Phillip Hallam-Baker
Cc: "cryptogra...@metzdowd.com" , ianG
Subject: Re: [Cryptography] The One True Cipher Suite
X-Mailer: Apple Mail (2.1283)
On Sep 9, 2013, at 12:00 PM, Philli
- Forwarded message from Eric Young -
Date: Tue, 10 Sep 2013 20:58:20 +1000
From: Eric Young
To: Eugen Leitl
Cc: cypherpu...@al-qaeda.net, i...@postbiota.org, zs-...@zerostate.is,
Cryptography List
Subject: Re: [Cryptography] [cryptography] Random number generation influenced,
HW RNG
12 matches
Mail list logo