New Technology to Make Digital Data Disappear, on Purpose

2009-07-21 Thread Ali, Saqib
The researchers said they had struck upon a unique approach that relies on “shattering” an encryption key that is held by neither party in an e-mail exchange but is widely scattered across a peer-to-peer file sharing system. The pieces of the key, small numbers, tend to “erode” over time as they

Re: spyware on Blackberries

2009-07-21 Thread Perry E. Metzger
Steven M. Bellovin s...@cs.columbia.edu writes: http://feeds.wired.com/~r/wired27b/~3/CFV8MEwH_rM/ A BlackBerry update that a United Arab Emirates service provider pushed out to its customers contains U.S.-made spyware that would allow the company or others to siphon and read their e-mail

Zooko's semi-private keys

2009-07-21 Thread Hal Finney
Zooko's proposal for semi-private keys is worthy of discussion here I think. The full idea is in http://allmydata.org/~zooko/lafs.pdf but I will present it here for your enjoyment (I should emphasize that I played no part in any of the development of this idea, I just read his PDF). Apologies in

Re: New Technology to Make Digital Data Disappear, on Purpose

2009-07-21 Thread dan
The pieces of the key, small numbers, tend to =93erode=94 over time as they gradually fall out of use. To make keys erode, or timeout, Vanish takes advantage of the structure of a peer-to-peer file system. Such networks are based on millions of personal computers whose Internet

Fast MAC algorithms?

2009-07-21 Thread Nicolas Williams
I've an application that is performance sensitive, which can re-key very often (say, every 15 minutes, or more often still), and where no MAC is accepted after 2 key changes. In one case the entity generating a MAC is also the only entity validating the MAC (but the MAC does go on the wire). I'm