[cryptography] Stealthy Dopant-Level Hardware Trojans

2013-09-13 Thread Eugen Leitl
http://people.umass.edu/gbecker/BeckerChes13.pdf Stealthy Dopant-Level Hardware Trojans ? Georg T. Becker1 , Francesco Regazzoni2 , Christof Paar1,3 , and Wayne P. Burleson1 1University of Massachusetts Amherst, USA 2TU Delft, The Netherlands and ALaRI - University of Lugano, Switzerland

[cryptography] motivation, research ethics organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)

2013-09-13 Thread Adam Back
I suspect there may be some positive correlation between brilliant minds and consideration of human rights ability to think independently and critically including in the area of uncritical acceptance authoritarian dictates. We're not talking about random grunt - we're talking about gifted end

Re: [cryptography] Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?

2013-09-13 Thread Jurre andmore
I have been looking at this proposal as well and it certainly has potential to make a comeback and be an actual standard, I wonder what the openpgp authors have to say, fabio, did you forward this to the openpgp list by any chance? Jurre 2013/9/11 Lodewijk andré de la porte l...@odewijk.nl

Re: [cryptography] motivation, research ethics organizational criminality (Re: Forward Secrecy Extensions for OpenPGP: Is this still a good proposal?)

2013-09-13 Thread David D
Applying one's beliefs to another can be a fatal mistake as people truly do think, feel, and act differently based on various factors. I agree that there are people who will drop one opportunity and pick up something else quickly.If you are one of these people, then think back to every

[cryptography] MITM Manipulation of Snowden Documents

2013-09-13 Thread John Young
It continues to mystify why Greenwald and others crop and redact documents and slides but show them to staff at O Globo, Guardian, Der Spiegel, New York Times, ProPublica, Washington Post and perhaps others yet to be disclosed with bombshell releases (now even Clapper is applauding the Snowden

Re: [cryptography] MITM Manipulation of Snowden Documents

2013-09-13 Thread David D
Plantation mentality. When you live within the box, your points of reference are the box. -Original Message- From: cryptography [mailto:cryptography-boun...@randombit.net] On Behalf Of Randall Webmail Sent: Friday, September 13, 2013 9:11 PM To: Crypto List Subject: Re:

Re: [cryptography] MITM Manipulation of Snowden Documents

2013-09-13 Thread Randall Webmail
From: John Young j...@pipeline.com To: crypt...@freelists.org, cryptography@randombit.net Sent: Friday, September 13, 2013 11:46:02 AM Subject: [cryptography] MITM Manipulation of Snowden Documents It continues to mystify why Greenwald and others crop and redact documents and slides but show them

Re: [cryptography] very little is missing for working BTNS in Openswan

2013-09-13 Thread Nico Williams
On Thu, Sep 12, 2013 at 08:28:56PM -0400, Paul Wouters wrote: Stop making crypto harder! I think you're arguing that active attacks are not a concern. That's probably right today w.r.t. PRISMs. And definitely wrong as to cafe shop wifi. The threat model is the key. If you don't care about

Re: [cryptography] no-keyring public

2013-09-13 Thread Samuel Neves
On 25-08-2013 13:38, Alexander Klimov wrote: There was a ECC program from the previous century that worked as you described: the private key was derived solely from the user password. Unfortunately, I cannot recall its name (and I suspect it already vanished from the net since it was not

Re: [cryptography] Compositing Ciphers?

2013-09-13 Thread Collin RM Stocks
On 09/06/2013 08:27 PM, Jeffrey Walton wrote: Hi All, With all the talk of the NSA poisoning NIST, would it be wise to composite ciphers? (NY Times, Guardian, Dr. Green's blog, et seq). I've been thinking about running a fast inner stream cipher (Salsa20 without a MAC) and wrapping it in AES

Re: [cryptography] Compositing Ciphers?

2013-09-13 Thread Tony Arcieri
On Fri, Sep 6, 2013 at 5:53 PM, Natanael natanae...@gmail.com wrote: Apparently it's called cascade encryption or cascade encipherment More generally it's known as a product cipher, which underlies things like Feistel Networks which were used to compose algorithms like DES: