That they have the capacity doesn't mean they ever actually did it,
Schneier's comment is conservative. It is obviously within in their (legal)
capacity to change anything going accross US and INTNET cables and to forge
a some families of signatures.
2013/9/6 Eugen Leitl eu...@leitl.org
Maybe some AES32?
2013/9/7 Perry E. Metzger pe...@piermont.com
Google is racing to encrypt the torrents of information that flow
among its data centers around the world, in a bid to thwart
snooping by the NSA as well as the intelligence agencies of foreign
Public key depends on high level math. That math has some asymetric
property that we can use to achieve the public-private key relationships.
The problem is that the discovery of smarter math can invalidate the
asymetry and make it more symetrical. This has to do with P=NP, which is
Everybody has to write a statement. The statement that most convinces the
public that we're okay gets published and a big-o-bonus. You guys have 3
The cryptography mailing list
2013/9/24 Bill Frantz fra...@pwpconsult.com
Field Programmable Gate Arrays (FPGA)
Yeah, those are definitely probably reflashable more easily than you'd
like. They're a bit more tricky than they'd seem to be at first. Definitely
a better choice than Intel though. On the todo list.
2013/9/29 James A. Donald jam...@echeque.com
(..) fact, they are not provably random, selected (...)
fixed that for you
It seems obvious that blatant lying about qualities of procedures must have
some malignant intention, yet ignorance is as good an explanation. I don't
think lying the other
It's reasonable as it's not a security sensitive environment. Please for
the love of god let some environments stay low-sec.
2013/10/1 Nick cryptography-l...@njw.me.uk
On Tue, Oct 01, 2013 at 10:28:48AM -0400, Greg wrote:
So, my password, iPoopInYourHat, is being sent to me in the clear by
2013/10/2 Russ Nelson nel...@crynwr.com
If you are proposing that something needs stronger encryption than
ROT-26, please explain the threat model that justifies your choice of
encryption and key distribution algorithms.
ROT-26 is fantastic for certain purposes. Like when encrypting for kids
IMO readability is very hard to measure. Likely things being where you
expect them to be, with minimal confusing characters but clear anchoring
so you can start reading from anywhere.
If someone could write a generative meta-language we can then ask people to
do text comprehension tasks on the
So their research was stolen and they were assassinated by the NSA? Makes
sense. (Except for the NSA's lack of field agents! CIA involvement is
The cryptography mailing list
2013/10/9 Phillip Hallam-Baker hal...@gmail.com
I see cyber-sabotage as being similar to use of chemical or biological
weapons: It is going to be banned because the military consequences fall
far short of being decisive, are unpredictable and the barriers to entry
I doubt that's
2013/10/10 Phillip Hallam-Baker hal...@gmail.com
The original author was proposing to use the same key for encryption and
signature which is a rather bad idea.
Explain why, please. It might expand the attack surface, that's true. You
could always add a signed message that says I used a key
2013/10/10 John Kelsey firstname.lastname@example.org
The problem with offensive cyberwarfare is that, given the imbalance
between attackers and defenders and the expanding use of computer controls
in all sorts of systems, a cyber war between two advanced countries will
not decide anything militarily,
Mail list logo