Terminator 2 Extreme DRM

2003-06-27 Thread Jon Simon
Looks like an attempt to get people to install DRM. The apple with poison. http://player.interactual.com/help/support/articles/0134.asp Q: Is the High-Definition feature (Disc 2) protected with any encryption? A: The Windows Media movie on the ROM portion of this disc contains security features

[johnmacsgroup] INTEL: Venona Project

2003-06-27 Thread R. A. Hettinga
--- begin forwarded text Status: U To: "DemocratsConvHall" <[EMAIL PROTECTED]> From: "CodeTen7" <[EMAIL PROTECTED]> Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED] Date: Thu, 26 Jun 2003 23:25:26 -0600 Subject: [johnmacsgroup] INTEL: Venona Project Reply-To: [EMAIL PROTECTED]

Re: Draft Edition of LibTomMath book

2003-06-27 Thread Werner Koch
On Fri, 27 Jun 2003 14:02:30 +1200, Peter Gutmann said: > the GMP source code to know what it does (GMP is a special case, being a > general bignum library but with an implicit acknowledgement that it's going to > end up used for crypto as well, although there are some missing primitives Does the

Re: Draft Edition of LibTomMath book

2003-06-27 Thread Marcel de Riedmatten
Le ven 27/06/2003 à 15:24, Werner Koch a écrit : > Does the proprietary SSH still use GMP? I know no other major crypto > apps using GMP for big number math. A problem with GMP is that it > heavily uses alloca() and thus it is not that hard to find traces of > secrets in the core. I know that f

[CYBERIA] H&R Block sued over "electronic transaction" methodpatent

2003-06-27 Thread R. A. Hettinga
--- begin forwarded text Status: U Thread-Topic: [CYBERIA] Combining Verizon DMCA case with Grokster Thread-Index: AcMU4iXZDMSa+RRWQF2ZUhfFWfqnygAAvxfwAlB7E0AAkYhJYAEs5nrAAGjbCxAAB3Zw8ADDJcDQADTT+2AALZj34AAK9CcQAMC7Y7ADgxgEkA== Date: Fri, 27 Jun 2003 10:02:33 -0400 Reply-To: Law &

Re: pubkeys for p and g

2003-06-27 Thread Peter Fairbrother
martin f krafft wrote: > My point was that some commercial vendors (Check Point and others) > claim, that if two partners want to perform a DH key exchange, they > may use their two public keys for g and p. This, in effect, would > mean that g and p were not globally known, but that the public ke

Re: pubkeys for p and g

2003-06-27 Thread Peter Fairbrother
martin f krafft wrote: > also sprach Peter Fairbrother <[EMAIL PROTECTED]> [2003.06.27.1903 +0200]: >> Can you give me a ref to where they say that? I'd like to know >> exactly what they are claiming. > > this will have to wait a couple of days. > >> Perhaps they are encrypting the DH secrets wi

New NTRUEncrypt Parameters

2003-06-27 Thread Whyte, William
(I've also posted this message to sci.crypt) Hi list, NTRU Cryptosystems has posted several new documents, which are avaible through http://www.ntru.com/cryptolab/params.htm. As background: recent results on NTRUEncrypt have shown that decryption failures on validly encrypted messages leak infor

Re: pubkeys for p and g

2003-06-27 Thread Nomen Nescio
martin f krafft writes: > My point was that some commercial vendors (Check Point and others) > claim, that if two partners want to perform a DH key exchange, they > may use their two public keys for g and p. This, in effect, would > mean that g and p were not globally known, but that the public key

Feedback from the LibTomMath Book?

2003-06-27 Thread tom st denis
Close to 100 people have downloaded the book so far [which is alot given the nature of the book] and although it has only been two days I was wondering if anyone has any initial impressions [good or bad]. I'm going to start the editing phase of the text fairly soon so I'd like to know what people