World-Renowned Cryptographer Arjen Lenstra Joins Bell Labs

2005-02-02 Thread R.A. Hettinga
http://www.mysan.de/international/article32397.html mysan.de/international - World-Renowned Cryptographer Arjen Lenstra Joins Bell Labs Adds Valuable Talent to Lucent Technologies#039; Network Security Research MURRAY HILL, N.J., Feb. 1 /PRNewswire-FirstCall/ -- Lucent Technologies

FSTC Announces Availability of FSTC Counter-Phishing Project Whitepaper and Supporting Documents

2005-02-02 Thread R.A. Hettinga
--- begin forwarded text Date: Tue, 01 Feb 2005 14:38:24 -0500 From: Zachary Tumin [EMAIL PROTECTED] Subject: FSTC Announces Availability of FSTC Counter-Phishing Project Whitepaper and Supporting Documents To: 'Members' members@ls.fstc.org Reply-To: [EMAIL PROTECTED] Thread-Index:

Dell to Add Security Chip to PCs

2005-02-02 Thread R.A. Hettinga
http://online.wsj.com/article_print/0,,SB110727370814142368,00.html The Wall Street Journal February 1, 2005 11:04 a.m. EST Dell to Add Security Chip to PCs By GARY MCWILLIAMS Staff Reporter of THE WALL STREET JOURNAL February 1, 2005 11:04 a.m. HOUSTON -- Dell Inc. today is expected

Re: Is 3DES Broken?

2005-02-02 Thread Daniel Carosone
On Mon, Jan 31, 2005 at 10:38:53PM -0500, Steven M. Bellovin wrote: When using CBC mode, one should not encrypt more than 2^32 64-bit blocks under a given key. That comes to ~275G bits, which means that on a GigE link running flat out you need to rekey at least every 5 minutes, which is

Call For Papers : HITB Security Conference Bahrain 2005

2005-02-02 Thread alpha
Hack In The Box Security Conference 2005 : Bahrain -- Greetings, We are inviting individuals or groups who are interested in computer and network security, challenges and practices to send in their papers for inclusion in HITBSecConf2005 Bahrain.

Re: Is 3DES Broken?

2005-02-02 Thread james hughes
On Jan 31, 2005, at 10:38 PM, Steven M. Bellovin wrote: When using CBC mode, one should not encrypt more than 2^32 64-bit blocks under a given key. That comes to ~275G bits, which means that on a GigE link running flat out you need to rekey at least every 5 minutes, which is often impractical.

Re: how to tell if decryption was successfull?

2005-02-02 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Andreas writes: [newbie here] I was wondering how can one tell if some data was successfully decrypted. Isn't there an assumption going on about what the cleartext data should be? Text? Image? ZIP file? Ziped jpeg? Another cyphertext? rot-13? There are a lot of

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Trei, Peter
Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Peter Trei Tyler Durden ANyone familiar with computer architectures and chips able to answer this question: That

Re: how to tell if decryption was successfull?

2005-02-02 Thread Matt Crawford
On Feb 1, 2005, at 13:29, Andreas wrote: I was wondering how can one tell if some data was successfully decrypted. Isn't there an assumption going on about what the cleartext data should be? Text? Image? ZIP file? Ziped jpeg? Another cyphertext? rot-13? Embedded checksums or hash codes added

Re: Call For Papers : HITB Security Conference Bahrain 2005

2005-02-02 Thread Adam Shostack
Posting to Dave Aitel's DailyDave list, HD Moore complained that he had not been reimbursed for 2003. The organizers responded that payment is forthcoming. Richard Thieme suggested that the correct response is to ensure you put forth no money to speak at this event. On Tue, Feb 01, 2005 at

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Erwann ABALEA
On Wed, 2 Feb 2005, Trei, Peter wrote: Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Please stop relaying FUD. You have full control over your PC, even if this one is

MSN Belgium to use eID cards for online checking

2005-02-02 Thread R.A. Hettinga
http://www.theregister.co.uk/2005/02/01/msn_belgium_id_cards/print.html The Register Biting the hand that feeds IT The Register » Internet and Law » Digital Rights/Digital Wrongs » Original URL: http://www.theregister.co.uk/2005/02/01/msn_belgium_id_cards/ MSN Belgium to use eID cards for

Peppercoin Small Payments Processing Suite Available to First Data Channels

2005-02-02 Thread R.A. Hettinga
http://biz.yahoo.com/prnews/050202/new005_1.html Yahoo! Finance Press Release Source: Peppercoin Peppercoin Small Payments Processing Suite Available to First Data Channels Wednesday February 2, 9:03 am ET Small Transaction Suite Certified for Sale Through Processor's Merchant Acquiring

Re: Is 3DES Broken?

2005-02-02 Thread bear
On Mon, 31 Jan 2005, Steven M. Bellovin wrote: snip re: 3des broken? [Moderator's note: The quick answer is no. The person who claims otherwise is seriously misinformed. I'm sure others will chime in. --Perry] I'll be happy to second Perry's comment -- I've seen no evidence whatsoever to

Can you help develop crypto anti-spoofing/phishing tool ?

2005-02-02 Thread Amir Herzberg
We develop TrustBar, a simple extension to FireFox ( Mozilla), that displays the name and logo of SSL protected sites, as well as of the CA (so users can notice the use of untrusted CA). I think it is fair to say that this extension fixes some glitches in the deployment of SSL/TLS, i.e. in the

Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Ian G
Erwann ABALEA wrote: On Wed, 2 Feb 2005, Trei, Peter wrote: Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Please stop relaying FUD. You have full control over your

Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Dan Kaminsky
Uh, you *really* have no idea how much the black hat community is looking forward to TCPA. For example, Office is going to have core components running inside a protected environment totally immune to antivirus. Since these components are going to be managing cryptographic operations, the

RE: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread J.A. Terranson
On Wed, 2 Feb 2005, Alan wrote: If you really want to send secret messages, just send it in the chaff in spam. Everyone is programmed to ignore it or filter it out. Yeah, but it doesn't make for great story copy or funding proposals ;-) -- Yours, J.A. Terranson [EMAIL PROTECTED]

Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread AW
Just herd of this http://www.spammimic.com/ AW Alan wrote: On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote: If you really want to send secret messages, just send it in the chaff in spam. Everyone is programmed to ignore it or filter it out.