question re practical use of secret sharing

2007-06-21 Thread Charles Jackson
A quick question. Is anyone aware of a commercial product that implements secret sharing? If so, can I get a pointer to some product literature? Chuck Jackson - The Cryptography Mailing List Unsubscribe by sending

RE: How the Greek cellphone network was tapped.

2007-07-19 Thread Charles Jackson
An earlier post, talking about vulnerabilities and the lack of an appropriate market response, said: We're talking about phone calls -- did all of the well-publicized cellular eavesdropping (Prince Charles, Newt Gingrich (then a major US politician), and more) prompt a change? Well,

RE: Another Snake Oil Candidate

2007-09-13 Thread Charles Jackson
I looked at the Ironkey website and, although there is obviously a little marketing-speak, my snake-oil and BS detectors do not go off. Some of the criticisms by Aram Perez appear to be somewhat unjustified. Perez states: Protected by a password that is entered on whatever PC you plug the

RE: Death of antivirus software imminent

2008-01-02 Thread Charles Jackson
One virtualization approach that I have not see mentioned on this thread is to run the virtual machine on a more secure OS than is used by the applications of interest. For example, one could run VMware on SELinux and use VMware to host Windows/Vista. Thus, even if a virus subverts Windows it

Center for Cryptologic History at the National Security Agency: Schorreck Memorial Lecture

2008-03-21 Thread Charles Jackson
Professor Christopher Andrew to present Schorreck Memorial Lecture, April 7, 2008 at 2:00 PM, Laurel, MD The Center for Cryptologic History at the National Security Agency is pleased to announce a lecture by Professor Christopher Andrew of Cambridge University, author of numerous books on

Article in Globe and Mail re ATM security

2008-07-02 Thread Charles Jackson
I don't recall seeing any discussion of this article on the list. http://www.theglobeandmail.com/servlet/story/RTGAM.20080702.wgtatmbreach0702 /BNStory/Technology/?page=rssid=RTGAM.20080702.wgtatmbreach0702 Chuck Jackson [Moderator's note: when forwarding links, please include some

NSA history

2008-11-14 Thread Charles Jackson
Here's a pointer to the new release http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/index.htm - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

WSJ Story on NSA history

2008-11-14 Thread Charles Jackson
http://online.wsj.com/article/SB122660908325125509.html - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

RE: CPRNGs are still an issue.

2008-12-17 Thread Charles Jackson
-Michael Heyman Wrote: Before we give up on using drive timings [as an entropy source], does anyone have evidence to verify this assertion [that SSD drives will have much less variation in read/write timing]? The reviews I have seen using tools like HD Tune and HD Tach seem to show timing noise

Physical security rather than crypto---but perhaps of interest

2009-07-14 Thread Charles Jackson
http://news.bbc.co.uk/2/hi/technology/8147534.stm Chuck [Moderator's note: It is helpful, when posting a link, to give enough information that people can know whether they want to go and read the article. In this case, the title and first few sentences are: Snooping through the power socket

Re: [Cryptography] tamper-evident crypto? (was: BULLRUN)

2013-09-05 Thread Charles Jackson
On Thu, Sep 5, 2013 at 9:18 PM, Peter Gutmann pgut...@cs.auckland.ac.nzwrote: To say the same thing the other way, I was always amazed that the Nazis were unable to figure out that their crypto was broken during WWII. There were experiments they could have done, such as sending out a few