Vlad SATtva Miller wrote:
Allen wrote on 31.01.2007 01:02:
I'll skip the rest of your excellent, and thought provoking post as it
is future and I'm looking at now.
From what you've written and other material I've read, it is clear that
even if the horizon isn't as short as five years, it is
Hi gang,
An idle question. English has a relatively low entropy as a
language. Don't recall the exact figure, but if you look at words
that start with q it is very low indeed.
What about other languages? Does anyone know the relative entropy
of other alphabetic languages? What about the
| Currently I'm dealing
| with very large - though not as large as 4 gig - x-ray, MRI, and
| similar files that have to be protected for the lifespan of the
| person, which could be 70+ years after the medical record is
| created. Think of the MRI of a kid to scan for some condition
|
| Hey, quick question.
|
| If one wants to have multiple keys, but for ease-of-use considerations
| want to only have the user enter one, is there a preferred way to
| derive multiple keys that, while not independent, are computationally
| independent?
|
| I was thinking of hashing the
On Sat, Feb 03, 2007 at 08:52:35PM -0800, Joseph Ashwood wrote:
- Original Message -
From: Andrea Pasquinucci [EMAIL PROTECTED]
To: Cryptography cryptography@metzdowd.com
Sent: Tuesday, January 30, 2007 12:33 PM
Subject: Re: Intuitive cryptography that's also practical and secure.
* I
Victor Duchovni [EMAIL PROTECTED] writes:
On Wed, Jan 31, 2007 at 01:57:04PM +1300, Peter Gutmann wrote:
You use the key in the old root to validate the self-signature in the new
root. Since they're the same key, you know that the new root supersedes the
expired one.
So this is a special
somewhat related
Study Finds Bank of America SiteKey is Flawed
http://it.slashdot.org/it/07/02/05/1323243.shtml
Study Finds Security Flaws on Web Sites of Major Banks
http://www.nytimes.com/2007/02/05/technology/05secure.html?ref=business
The Emperor's New Security Indicators
Anne Lynn Wheeler wrote:
http://news.com.com/IBM+donates+new+privacy+tool+to+open-source/2100-1029_3-6153625.html
from above:
The encrypted credentials would be for one-time use only. The next purchase or
other transaction will require a new credential. The process is similar to the
On Sun, Feb 04, 2007 at 11:27:00PM -0500, Leichter, Jerry wrote:
| 1) use a random key as large as the plaintext (one-time-pad)
...thus illustrating once again both the allure and the uselessness (in
almost all situations) of one-time pads.
For long-term storage, you are correct, OTP at best
On Sun, 04 Feb 2007 15:46:41 -0800
Allen [EMAIL PROTECTED] wrote:
Hi gang,
An idle question. English has a relatively low entropy as a language.
Don't recall the exact figure, but if you look at words that start
with q it is very low indeed.
What about other languages? Does anyone know
Andrea Pasquinucci wrote:
or to sit next to a
coercer with a gun watching her voting.
The fact that the voter is remote and outside a controlled location
makes it impossible to guarantee incoercibility and no-vote-selling.
This is not a crypto or IT problem. I do not think (correct me if
11 matches
Mail list logo