Re: Logging of Web Usage

2003-04-04 Thread Ben Laurie
Bill Frantz wrote: At 6:16 PM -0800 4/2/03, Seth David Schoen wrote: Bill Frantz writes: The http://cryptome.org/usage-logs.htm URL says: Low resolution data in most cases is intended to be sufficient for marketing analyses. It may take the form of IP addresses that have been subjected to a

ENC: Review of Cryptanalysis book?

2003-04-04 Thread Mads Rasmussen
Remember I asked some time ago about a review for Samuel Wagstaff's recent book on cryptanalysis of number theoretic ciphers? I still haven't found any, but I wrote to Samuel to ask him if he knew if any existed. Below I have, with his permission, copied his answer. Regards, Mads

Re: Russia Intercepts US Military Communications?

2003-04-04 Thread Ian Grigg
Arnold G. Reinhold [EMAIL PROTECTED] wrote: The Army actually has a training course (from 1990) on-line that describes such a system in detail. The cipher system, called DRYAD is covered in https://hosta.atsc.eustis.army.mil/cgi-bin/atdl.dll/accp/is1100/ch4.htm . Your description fits, it

response to comments on NIST SP800-38B

2003-04-04 Thread Morris Dworkin
NIST received several thoughtful public comments on the draft NIST Special Publication 800-38B specifying RMAC as a recommended MAC algorithm for use with either AES and Triple DES. In response to the comments, NIST has posted a consultation paper at http://csrc.nist.gov/CryptoToolkit/modes/,

Re: TPM coming to Canada

2003-04-04 Thread John Kelsey
At 01:58 PM 4/3/03 +1200, Peter Gutmann wrote: ... A better suggestion for killing it: Write letters strongly encouraging the PKI-based method. *Snork!* That's perfect. ...as computer security professionals, we feel that it is our duty to advise the legislature of the critical importance of