Adam Back writes a very thorough analysis of possible consequences of the
amazing power of the TCPA/Palladium model. He is clearly beginning to
get it as far as what this is capable of. There is far more to this
technology than simple DRM applications. In fact Adam has a great idea
for how
,,Cryptanalysis of Block Ciphers with Overdefined Systems of Equations''
Nicolas Courtois and Josef Pieprzyk
http://eprint.iacr.org/2002/044/
Abstract: Several recently proposed ciphers are built with layers of
small S-boxes, interconnected by linear key-dependent layers. Their
security relies
On Tue, Dec 04, 2001 at 03:32:04PM +0800, Enzo Michelangeli wrote:
Actually, the authentication is not performed by Visa, but by the issuer
(the member bank that has issued the card). Visa only manages a directory
server where the merchant's plugin looks up the first six digits of the card
At 02:14 PM 9/17/01 -0400, Jim Windle wrote:
Second, if we assume for a minute that the terrorist use public key
systems
Given their 1. quality opsec including 2. wise avoidance of wireless
phones, etc, and their
3. dependence on long-time personal contacts, isn't it more likely that
private