Re: (Short) Intro and question

2007-01-08 Thread Steven M. Bellovin
On Sat, 06 Jan 2007 13:13:32 -0800 Allen <[EMAIL PROTECTED]> wrote: > Hi everyone, > > I'm Allen Schaaf and I'm primarily an information security analyst - > I try to look at things like a total stranger and ask all the dumb > questions hoping to stumble on one or two that hadn't been asked > bef

Re: (Short) Intro and question

2007-01-08 Thread Ivan Krstić
Allen wrote: > One of the questions that I have been raising is trust and how to ensure > that that it is not misplaced or eroded over time. Which leads me to my > question for the list: I can see easily how to do split key for 2 out of > x for key recovery, but I can't seem to find a reference to

Re: (Short) Intro and question

2007-01-08 Thread Saqib Ali
I think you are looking for the m of n solution, or commonly known as shared secret which can be implemented using shamir's or blakley's scheme. you can find a open source implementation of shamir's scheme @ http://point-at-infinity.org// or more info check out the wikipedia entry: http://en

Re: (Short) Intro and question

2007-01-08 Thread Chris Kuethe
On 1/6/07, Allen <[EMAIL PROTECTED]> wrote: One of the questions that I have been raising is trust and how to ensure that that it is not misplaced or eroded over time. Which leads me to my question for the list: I can see easily how to do split key for 2 out of x for key recovery, but I can't see

Re: secure CRNGs and FIPS (Re: How important is FIPS 140-2 Level 1 cert?)

2007-01-08 Thread Matthias Bruestle
Adam Back wrote: > About the criticisms of Common Critera evaluation in general, I think > why people complain it is a documentation exercise is because pretty > much all it does ensure that it does what it says it does. So > basically you have to enumerates threats, state what threats the > syste

[EMAIL PROTECTED]: [fc-announce] FC07: Preliminary program and call for participation]

2007-01-08 Thread R. Hirschfeld
From: Sven Dietrich <[EMAIL PROTECTED]> Subject: [fc-announce] FC07: Preliminary program and call for participation To: [EMAIL PROTECTED] Date: Mon, 8 Jan 2007 08:08:09 -0500 (EST) Dear Colleague, Please see below for the preliminary program and call for participation for Financial Cryptogra

[EMAIL PROTECTED]: [fc-announce] Usable Security--Prelim Program--Jan 8 Hotel Deadline]

2007-01-08 Thread R. Hirschfeld
From: Rachna Dhamija <[EMAIL PROTECTED]> Subject: [fc-announce] Usable Security--Prelim Program--Jan 8 Hotel Deadline To: [EMAIL PROTECTED] Date: Fri, 5 Jan 2007 11:45:31 -0800 Below is the preliminary program for Usable Security, a workshop that will be held in conjunction with FC07. Note that

Re: Tamperproof, yet playing Tetris.

2007-01-08 Thread Anne & Lynn Wheeler
... and has now made slashdot Chip & PIN Terminal Playing Tetris http://hardware.slashdot.org/hardware/07/01/08/1355221.shtml previous post http://www.garlic.com/~lynn/aadsm26.htm#20 Tamperproof, yet playing Tetris recent related comments http://www.garlic.com/~lynn/aadsm26.htm#21 FC07 Pre