Re: OT: SSL certificate chain problems

2007-02-04 Thread Victor Duchovni
On Wed, Jan 31, 2007 at 01:57:04PM +1300, Peter Gutmann wrote: Victor Duchovni [EMAIL PROTECTED] writes: What I don't understand is how the old (finally expired) root helps to validate the new unexpired root, when a verifier has the old root and the server presents the new root in its trust

Re: data under one key, was Re: analysis and implementation of LRW

2007-02-04 Thread Vlad \SATtva\ Miller
Allen wrote on 31.01.2007 01:02: I'll skip the rest of your excellent, and thought provoking post as it is future and I'm looking at now. From what you've written and other material I've read, it is clear that even if the horizon isn't as short as five years, it is certainly shorter than 70.

Re: Intuitive cryptography that's also practical and secure.

2007-02-04 Thread Alexander Klimov
On Tue, 30 Jan 2007, Leichter, Jerry wrote: This is a common misconception. The legal system does not rely on lawyers, judges, members of Congress, and so on understanding how technology or science works. It doesn't rely on them coming to accept the trustworthiness of the technology on any

Re: Private Key Generation from Passwords/phrases

2007-02-04 Thread Allen
Alexander Klimov wrote: [snip] (Of course, with 60K passwords there is almost for sure at least one password1 or Steven123 and thus the salts are irrelevant.) I'm not sure I understand this statement as I just calculated the HMAC MD5 for password1 using a salt of 7D00 (32,000 decimal)

Re: IBM donates new privacy tool to open-source Higgins

2007-02-04 Thread Hal Finney
John Gilmore forwards: IBM donates new privacy tool to open-source By Joris Evers Staff Writer, CNET Published: January 25, 2007, 9:00 PM PST IBM has developed software designed to let