http://www.mysan.de/international/article32397.html
mysan.de/international -
World-Renowned Cryptographer Arjen Lenstra Joins Bell Labs
Adds Valuable Talent to Lucent Technologies#039; Network Security Research
MURRAY HILL, N.J., Feb. 1 /PRNewswire-FirstCall/ -- Lucent Technologies
--- begin forwarded text
Date: Tue, 01 Feb 2005 14:38:24 -0500
From: Zachary Tumin [EMAIL PROTECTED]
Subject: FSTC Announces Availability of FSTC Counter-Phishing Project
Whitepaper and Supporting Documents
To: 'Members' members@ls.fstc.org
Reply-To: [EMAIL PROTECTED]
Thread-Index:
http://online.wsj.com/article_print/0,,SB110727370814142368,00.html
The Wall Street Journal
February 1, 2005 11:04 a.m. EST
Dell to Add Security Chip to PCs
By GARY MCWILLIAMS
Staff Reporter of THE WALL STREET JOURNAL
February 1, 2005 11:04 a.m.
HOUSTON -- Dell Inc. today is expected
On Mon, Jan 31, 2005 at 10:38:53PM -0500, Steven M. Bellovin wrote:
When using CBC mode, one should not encrypt more than 2^32 64-bit
blocks under a given key. That comes to ~275G bits, which means that
on a GigE link running flat out you need to rekey at least every 5
minutes, which is
Hack In The Box Security Conference 2005 : Bahrain
--
Greetings,
We are inviting individuals or groups who are
interested in computer and network security, challenges and
practices to send in their papers for inclusion in HITBSecConf2005 Bahrain.
On Jan 31, 2005, at 10:38 PM, Steven M. Bellovin wrote:
When using CBC mode, one should not encrypt more than 2^32 64-bit
blocks under a given key. That comes to ~275G bits, which means that
on a GigE link running flat out you need to rekey at least every 5
minutes, which is often impractical.
In message [EMAIL PROTECTED], Andreas writes:
[newbie here]
I was wondering how can one tell if some data was successfully
decrypted. Isn't there an assumption going on about what the cleartext
data should be? Text? Image? ZIP file? Ziped jpeg? Another cyphertext?
rot-13?
There are a lot of
Seeing as it comes out of the TCG, this is almost certainly
the enabling hardware for Palladium/NGSCB. Its a part of
your computer which you may not have full control over.
Peter Trei
Tyler Durden
ANyone familiar with computer architectures and chips able to
answer this
question:
That
On Feb 1, 2005, at 13:29, Andreas wrote:
I was wondering how can one tell if some data was successfully
decrypted. Isn't there an assumption going on about what the cleartext
data should be? Text? Image? ZIP file? Ziped jpeg? Another cyphertext?
rot-13?
Embedded checksums or hash codes added
Posting to Dave Aitel's DailyDave list, HD Moore complained that he
had not been reimbursed for 2003. The organizers responded that
payment is forthcoming. Richard Thieme suggested that the correct
response is to ensure you put forth no money to speak at this event.
On Tue, Feb 01, 2005 at
On Wed, 2 Feb 2005, Trei, Peter wrote:
Seeing as it comes out of the TCG, this is almost certainly
the enabling hardware for Palladium/NGSCB. Its a part of
your computer which you may not have full control over.
Please stop relaying FUD. You have full control over your PC, even if this
one is
http://www.theregister.co.uk/2005/02/01/msn_belgium_id_cards/print.html
The Register
Biting the hand that feeds IT
The Register » Internet and Law » Digital Rights/Digital Wrongs »
Original URL: http://www.theregister.co.uk/2005/02/01/msn_belgium_id_cards/
MSN Belgium to use eID cards for
http://biz.yahoo.com/prnews/050202/new005_1.html
Yahoo! Finance
Press Release
Source: Peppercoin
Peppercoin Small Payments Processing Suite Available to First Data Channels
Wednesday February 2, 9:03 am ET
Small Transaction Suite Certified for Sale Through Processor's Merchant
Acquiring
On Mon, 31 Jan 2005, Steven M. Bellovin wrote:
snip re: 3des broken?
[Moderator's note: The quick answer is no. The person who claims
otherwise is seriously misinformed. I'm sure others will chime
in. --Perry]
I'll be happy to second Perry's comment -- I've seen no evidence
whatsoever to
We develop TrustBar, a simple extension to FireFox ( Mozilla), that
displays the name and logo of SSL protected sites, as well as of the CA
(so users can notice the use of untrusted CA). I think it is fair to say
that this extension fixes some glitches in the deployment of SSL/TLS,
i.e. in the
Erwann ABALEA wrote:
On Wed, 2 Feb 2005, Trei, Peter wrote:
Seeing as it comes out of the TCG, this is almost certainly
the enabling hardware for Palladium/NGSCB. Its a part of
your computer which you may not have full control over.
Please stop relaying FUD. You have full control over your
Uh, you *really* have no idea how much the black hat community is
looking forward to TCPA. For example, Office is going to have core
components running inside a protected environment totally immune to
antivirus. Since these components are going to be managing
cryptographic operations, the
On Wed, 2 Feb 2005, Alan wrote:
If you really want to send secret messages, just send it in the chaff in
spam. Everyone is programmed to ignore it or filter it out.
Yeah, but it doesn't make for great story copy or funding proposals ;-)
--
Yours,
J.A. Terranson
[EMAIL PROTECTED]
Just herd of this http://www.spammimic.com/
AW
Alan wrote:
On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote:
If you really want to send secret messages, just send it in the chaff in
spam. Everyone is programmed to ignore it or filter it out.
19 matches
Mail list logo