Re: Query about hash function capability

2005-08-05 Thread Jason Holt
On Thu, 4 Aug 2005, Arash Partow wrote: ie: input1 : abcdefg - h(abcdefg) = 123 input2 : gabcdef - h(gabcdef) = 123 input3 : fgabcde - h(fgabcde) = 123 I don't have a formal reference for you, but this seems intuitively correct to me: put the strings in a canonical form so that all

Re: [Clips] Escaping Password Purgatory

2005-08-05 Thread Jerrold Leichter
| Computer Hardware Software | Escaping Password Purgatory | David M. Ewalt, 08.03.05, 3:00 PM ET | | ... I think I have passwords for | over 47 different applications both internal and external that I access, | and I've acquired those IDs and passwords over several years, says Wayne |

Re: Query about hash function capability

2005-08-05 Thread Jerrold Leichter
| Hi all, | | My question relates to hash functions in general and not specifically | cryptographic hashes. I was wondering if there exists a group of hash | function(s) that will return an identical result for sequentially | similar yet rotate/shift wise dissimilar input: | | ie: input1 :

Re: Cross logins

2005-08-05 Thread James A. Donald
-- James A. Donald Is it possible for two web sites to arrange for cross logins? Steve Furlong Does this question have a practical end in mind? If so, can you simplify matters by running both web sites on the same host? The situation envisaged is that A.com is known to B.com, and

[Clips] Phil Zimmermann defends his VoIP crypto

2005-08-05 Thread R.A. Hettinga
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Fri, 5 Aug 2005 12:07:11 -0400 To: Philodox Clips List [EMAIL PROTECTED] From: R.A. Hettinga [EMAIL PROTECTED] Subject: [Clips] Phil Zimmermann defends his VoIP crypto Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED]

[Clips] Does Phil Zimmermann need a clue on VoIP?

2005-08-05 Thread R.A. Hettinga
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Fri, 5 Aug 2005 12:06:24 -0400 To: Philodox Clips List [EMAIL PROTECTED] From: R.A. Hettinga [EMAIL PROTECTED] Subject: [Clips] Does Phil Zimmermann need a clue on VoIP? Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED]

[Clips] Knowing me, knowing you

2005-08-05 Thread R.A. Hettinga
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Fri, 5 Aug 2005 15:08:12 -0400 To: Philodox Clips List [EMAIL PROTECTED] From: R.A. Hettinga [EMAIL PROTECTED] Subject: [Clips] Knowing me, knowing you Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED]

Re: [Clips] Does Phil Zimmermann need a clue on VoIP?

2005-08-05 Thread Victor Duchovni
On Fri, Aug 05, 2005 at 12:07:44PM -0400, R.A. Hettinga wrote: http://blogs.zdnet.com/Ou/?p=86 | George Ou | ZDNet.com Just about every other PKI-alternative cryptography company has gone as far as declaring PKI dead even tough PKI has been thriving for the last decade with E-Commerce

Re: draft paper: Deploying a New Hash Algorithm

2005-08-05 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Steve Furlong writes: [Moderator's note: ... attackers are often cleverer than protocol designers. ... Is that true? Or is it a combination of (a) a hundred attackers for every designer, and (b) vastly disparate rewards: continued employment and maybe some kudos