Here's the distribution of RSA key sizes in SSL servers, as
recorded by my SSL server survey in June 2000 and June 2001
RSA Server Key size
Key bits2000 2001
2048 .2% .2%
1024 70% 80%
>=
http://scripts.ireland.com/newspaper/breaking/printable.cfm?id=44705
FBI checks Network Associates accounting
The SEC has launched a formal inquiry into Network Associates' fiscal 2000
accounting practices, the California based company said.
Network Associates stock was off about 13 per cent a
[Note: I'm just passing on posts from sci.crypt. I've
not confirmed this independently
It appears that not every product which uses smart
cards is secure
- pt]
From: [EMAIL PROTECTED] (Philippe Mestral)
Newsgroups: sci.crypt
Subject: I've teste
A while ago I wrote some code to search for human readable test
vectors for Arnold Reinhold's ciphersaber-2
(http://ciphersaber.gurus.com).
Ciphersaber-2 is designed to be simple enough to be implemented from
memory, to avoid the risk of being caught with crypto software on your
computer for use
Distributed.net, which has won several of the RSA Secret Key
challenges, and is currently 73% of the way through the
RC5-64 contest, has lost it's ISP.
Peter Trei
>From their front page:
- start quote
We need your help!
URGENT: We have recently learned that our long-s
At 05:38 PM 03/23/2002 -0800, Lucky Green wrote:
>While the latter doesn't warrant comment, one question to ask
>spokespersons pitching the former is "what key size is the majority of
>your customers using with your security product"? Having worked in this
>industry for over a decade, I can state
Unfortunately, the article that Bob Hettinga excerpted from the
South China Morning Post is a pay-only article.
http://www.es.jamstec.go.jp/ <- Japanese government site.
http://www.es.jamstec.go.jp/esc/eng/ <- Good page
http://www.es.jamstec.go.jp/esrdc/eng/menu.html <- The ES center
http://www.e
I've posted my thoughts about Bernstein's paper to the NANOG list, so I
won't recap them here. I do want to make one point that people seem to be
ignoring, however, and it has to do with the section of Lucky's message
that I have quoted below.
There are several significant applications in wide-sp
Hi
I'd like to find an authentication protocol that fits my needs:
1. 2 [automated] parties
2. no trusted 3rd party intemediary ['Trent' in _Applied_Crypto_]
Most of the stuff in _Applied_Crypto_ requires that third party. It may
be an impossible task, nothing seems obvious to me. Pointers,
sugg