Re: CPRNGs are still an issue.

2008-12-16 Thread mhey...@gmail.com
On Thu, Dec 11, 2008 at 8:42 PM, Damien Miller d...@mindrot.org wrote: On Thu, 11 Dec 2008, James A. Donald wrote: If one uses a higher resolution counter - sub microsecond - and times multiple disk accesses, one gets true physical randomness, since disk access times are effected by

security fail (from failblog)

2009-05-22 Thread mhey...@gmail.com
See http://failblog.org/2009/05/22/security-fail-5. -Michael Heyman - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com

Re: Fast MAC algorithms?

2009-07-22 Thread mhey...@gmail.com
On Wed, Jul 22, 2009 at 1:43 AM, Nicolas Williamsnicolas.willi...@sun.com wrote: But that's not what I'm looking for here.  I'm looking for the fastest MACs, with extreme security considerations...In the crypto world one never designs weak-but-fast algorithms on purpose, only

Re: Fast MAC algorithms?

2009-07-23 Thread mhey...@gmail.com
On Thu, Jul 23, 2009 at 1:34 AM, Peter Gutmannpgut...@cs.auckland.ac.nz wrote: mhey...@gmail.com mhey...@gmail.com writes: 2) If you throw TCP processing in there, unless you are consistantly going to have packets on the order of at least 1000 bytes, your crypto algorithm is almost _irrelevant_

Hacker Says iPhone 3GS Encryption Is ‘Useless’ f or Businesses

2009-07-24 Thread mhey...@gmail.com
From http://www.wired.com/gadgetlab/2009/07/iphone-encryption/: the supposedly enterprise-friendly encryption included with the iPhone 3GS is so weak it can be cracked in two minutes with a few pieces of readily available freeware...“I don’t think any of us [developers] have ever seen

Re: Malware using good crypto

2009-08-04 Thread mhey...@gmail.com
On Sat, Aug 1, 2009 at 11:52 PM, Udhay Shankar Nud...@pobox.com wrote: Interesting article. Anyone here have experience trying to reverse-engineer malware that uses really good crypto? I haven't done this personally but I have worked with people who do. Typically, the type of encryption isn't

AES in stick figures

2009-09-28 Thread mhey...@gmail.com
A Stick Figure Guide to the Advanced Encryption Standard (AES) (A play in 4 acts) http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html -Michael Heyman - The Cryptography Mailing List Unsubscribe by sending

Re: Is this the first ever practically-deployed use of a threshold scheme?

2010-08-11 Thread mhey...@gmail.com
On Sun, Aug 1, 2010 at 7:10 AM, Peter Gutmann pgut...@cs.auckland.ac.nz wrote: ...does anyone know of any significant use [of split keys] by J.Random luser?  I'm interested in this from a usability point of view. Maybe not J.Random but J.Corporate... A few jobs ago back in the late '90s, I