Re: data under one key, was Re: analysis and implementation of LRW

2007-02-05 Thread Allen
Vlad SATtva Miller wrote: Allen wrote on 31.01.2007 01:02: I'll skip the rest of your excellent, and thought provoking post as it is future and I'm looking at now. From what you've written and other material I've read, it is clear that even if the horizon isn't as short as five years, it is

Entropy of other languages

2007-02-05 Thread Allen
Hi gang, An idle question. English has a relatively low entropy as a language. Don't recall the exact figure, but if you look at words that start with q it is very low indeed. What about other languages? Does anyone know the relative entropy of other alphabetic languages? What about the

Re: data under one key, was Re: analysis and implementation of LRW

2007-02-05 Thread Leichter, Jerry
| Currently I'm dealing | with very large - though not as large as 4 gig - x-ray, MRI, and | similar files that have to be protected for the lifespan of the | person, which could be 70+ years after the medical record is | created. Think of the MRI of a kid to scan for some condition |

Re: deriving multiple keys from one passphrase

2007-02-05 Thread Leichter, Jerry
| Hey, quick question. | | If one wants to have multiple keys, but for ease-of-use considerations | want to only have the user enter one, is there a preferred way to | derive multiple keys that, while not independent, are computationally | independent? | | I was thinking of hashing the

Re: Intuitive cryptography that's also practical and secure.

2007-02-05 Thread Andrea Pasquinucci
On Sat, Feb 03, 2007 at 08:52:35PM -0800, Joseph Ashwood wrote: - Original Message - From: Andrea Pasquinucci [EMAIL PROTECTED] To: Cryptography cryptography@metzdowd.com Sent: Tuesday, January 30, 2007 12:33 PM Subject: Re: Intuitive cryptography that's also practical and secure. * I

Re: OT: SSL certificate chain problems

2007-02-05 Thread Peter Gutmann
Victor Duchovni [EMAIL PROTECTED] writes: On Wed, Jan 31, 2007 at 01:57:04PM +1300, Peter Gutmann wrote: You use the key in the old root to validate the self-signature in the new root. Since they're the same key, you know that the new root supersedes the expired one. So this is a special

Re: man in the middle, SSL

2007-02-05 Thread Anne Lynn Wheeler
somewhat related Study Finds Bank of America SiteKey is Flawed http://it.slashdot.org/it/07/02/05/1323243.shtml Study Finds Security Flaws on Web Sites of Major Banks http://www.nytimes.com/2007/02/05/technology/05secure.html?ref=business The Emperor's New Security Indicators

Re: News.com: IBM donates new privacy tool to open-source Higgins

2007-02-05 Thread Anne Lynn Wheeler
Anne Lynn Wheeler wrote: http://news.com.com/IBM+donates+new+privacy+tool+to+open-source/2100-1029_3-6153625.html from above: The encrypted credentials would be for one-time use only. The next purchase or other transaction will require a new credential. The process is similar to the

OTP, was Re: data under one key, was Re: analysis and implementation of LRW

2007-02-05 Thread Travis H.
On Sun, Feb 04, 2007 at 11:27:00PM -0500, Leichter, Jerry wrote: | 1) use a random key as large as the plaintext (one-time-pad) ...thus illustrating once again both the allure and the uselessness (in almost all situations) of one-time pads. For long-term storage, you are correct, OTP at best

Re: Entropy of other languages

2007-02-05 Thread Steven M. Bellovin
On Sun, 04 Feb 2007 15:46:41 -0800 Allen [EMAIL PROTECTED] wrote: Hi gang, An idle question. English has a relatively low entropy as a language. Don't recall the exact figure, but if you look at words that start with q it is very low indeed. What about other languages? Does anyone know

Re: Intuitive cryptography that's also practical and secure.

2007-02-05 Thread Ed Gerck
Andrea Pasquinucci wrote: or to sit next to a coercer with a gun watching her voting. The fact that the voter is remote and outside a controlled location makes it impossible to guarantee incoercibility and no-vote-selling. This is not a crypto or IT problem. I do not think (correct me if