an I do about it, as an individual? Make the cellphone companies
>> build good crypto into their systems? Any ideas how to do that?
>
> Nope. Cellphone companies are big slow moving
> targets. They get their franchise from the
> government. If the NSA wants weak crypto, they
f the adversary of
distinguishing h(g^{ab}) from k is negligible in _n_).
References to this are much appreciated.
Regards,
Jaap-Henk
--
Jaap-Henk Hoepman | I've got sunshine in my pockets
Dept. of Computer Science | Brought it back to spray the day
University of Nijmegen |
;
> right, so it's no better than the arguable hard problem of factoring
> a 2048 bit number.
--
Jaap-Henk Hoepman | I've got sunshine in my pockets
Dept. of Computer Science | Brought it back to spray the day
University of Nijmegen |Gry "Rocket&
GRNWrS
>
>
> -----
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
>
--
Jaap-Henk Hoepman | I've got sunshine in my pockets
Dept. of Computer
nsaction contents seems to be infeasible, given the number of bits
> which must be copied.)
>
> -
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
>
>
--
Jaap-Henk Hoep
ll <[EMAIL PROTECTED]> writes:
> Is there a real problem that they uniquely solve, sufficient
> to drive the building of the needed infrastructure?
> I don't see it, and I'd love to be made smarter.
>
> --
> Pat Farrell
> http://www.pfarrell.com
--
Jaap-Henk Hoepm
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
>
>
--
Jaap-Henk Hoepman | I've got sunshine in my pockets
Dept. of Computer Science | Brought it back to spray the day
Radboud University Nijmegen |Gry "Rocket"
(
ling List
> | Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
>
> -
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
&g
7;re SOL.
>
> Peter Trei
>
> -----
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
>
>
--
Jaap-Henk Hoepman | I've got su
rican (and thus subverted) CA to get the recipients public
key.
What other reasons could there be for this advice?
Best,
Jaap-Henk
(I apologise for typos and being terse; this mail was written on an iPad)
--
Jaap-Henk Hoepman
TNO, Groningen &
Dept. of Computer Science
Radboud University N
>
> Public-key cryptography is less well-understood than symmetric-key
> cryptography. It is also tetchier than symmetric-key crypto, and if you pay
> attention to us talking about issues with nonces, counters, IVs, chaining
> modes, and all that, you see that saying that it's tetchier than tha
> I have also, in debate with Jerry, opined that public-key cryptography is a
> powerful thing that can't be replaced with symmetric-key cryptography. That's
> something that I firmly believe. At its most fundamental, public-key crypto
> allows one to encrypt something to someone whom one does
>
> Symetric cryptography does a much easier thing. It combines data and some
> mysterious data (key) in a way that you cannot extract data without the
> mysterious data from the result. It's like a + b = c. Given c you need b to
> find a. The tricks that are involved are mostly about sufficie
13 matches
Mail list logo