Re: Criminalizing crypto criticism

2001-07-31 Thread Rick Smith at Secure Computing
At 01:13 PM 7/27/2001, Steven M. Bellovin wrote: It's certainly not broad enough -- it protects encryption research, and the definition of encryption in the law is meant to cover just that, not cryptography. And the good-faith effort to get permission is really an invitation to harrassment,

Re: New encryption technology closes WLAN security loopholes

2001-09-26 Thread Rick Smith at Secure Computing
At 05:44 PM 9/24/2001, [EMAIL PROTECTED] wrote: In increasingly many environments, the term perimeter makes little sense. See, for example, the CCS-2000 paper on Distributed Firewalls by Sotiris Ioannidis et al. You can get it (among other places) from

Re: Best practices/HOWTO for key storage in small office/home office setting?

2001-10-03 Thread Rick Smith at Secure Computing
At 11:41 AM 10/2/2001, Bill Stewart wrote: At 07:23 PM 10/02/2001 +0300, Sampo Syreeni wrote: Or integrate some computing power into those IBM thingies, and use remotely keyed encryption. Enough power is available through USB so that you don't have to end up with battery power. Sounds like

Re: Rubber hose attack

2001-11-02 Thread Rick Smith at Secure Computing
At 11:08 AM 11/1/2001, vertigo wrote: It appears that a lot of work has to be done and a lot of money spent before even a small amount of trust in an individual's proof of identity (on a world- or Internet-wide scale) can be established. Hmmm. I'm able to walk into a bank in semi-rural Italy

Re: Rubber hose attack

2001-11-02 Thread Rick Smith at Secure Computing
At 11:44 AM 11/2/2001, vertigo wrote: The point is, without this cosmic notion of trust, _I_ could walk into a bank in semi-rurual Turkey and pull hundreds of dollars from YOUR credit card ac- count. Of course. But this hasn't prevented people from acquiring and using credit cards. More to the

Re: Rubber hose attack

2001-11-02 Thread Rick Smith at Secure Computing
Rick Smith at Secure Computing writes: While I would feel compassion for consumers who are hurt or inconvenienced by some huge scam that exploited a poor Microsoft security implementation, such a scenario would be entertaining to watch. At 11:49 AM 11/2/2001, [EMAIL PROTECTED

Re: Proving security protocols

2001-11-02 Thread Rick Smith at Secure Computing
At 09:00 AM 11/1/2001, Roop Mukherjee wrote: Can someone offer some criticism of the practice formal verification in general ? Okay, I'll grab this hot potato. There are a few cases where a commercial development organization performs formal verification, which would seem to indicate that it

Re: when a fraud is a sale, Re: Rubber hose attack

2001-11-09 Thread Rick Smith at Secure Computing
At 06:48 PM 11/5/2001, David Jablon wrote: Yet, strong network-based authentication of people does not require complex secret information ... if complex means demanding at least {64, 80, 128} random bits. With emerging strong password schemes, your average one-in-a-thousand or one-in-a-million

Re: Scarfo keylogger, PGP

2001-10-17 Thread Rick Smith at Secure Computing
At 05:21 AM 10/16/2001, Ben Laurie wrote: Rick Smith at Secure Computing wrote: Is this a serious security failure in PGP? No, it's a problem with any programmable computer. If you can install new programs, you can install changes to existing programs. That is not true - its a function

Re: biometrics

2002-01-28 Thread Rick Smith at Secure Computing
The essential problem I've always seen with biometrics (and one that Dorothy Denning acknowledged in her recent op ed piece without seriously examining) is the question of whether it's as efficient to deploy and manage biometrics safely as it is to deploy and manage some keyed alternative

Re: Fingerprints (was: Re: biometrics)

2002-01-28 Thread Rick Smith at Secure Computing
At 02:46 PM 1/28/2002, [EMAIL PROTECTED] wrote: The process took about 20-30 minutes; Have you been fingerprinted before? Did it take that long in that case? In my own experience, it only takes a few minutes to be fingerprinted on a standard card and, in theory, they should be able to build a

RE: Welome to the Internet, here's your private key

2002-02-07 Thread Rick Smith at Secure Computing
At 12:20 PM 2/4/2002, Bill Stewart wrote: A smartcard-only system probably _is_ too limited to generate keys, but that's the only realistic case I see. Here are some manufacturer claims for the DataKey 330 smart card: average of 23 seconds to generate a 1,024-bit RSA key, average of 3 minutes