RE: Cryptoprocessors compliant with FIPS 140-2

2003-03-24 Thread dave
/cryptval/140-1/1401val2003.htm _ Dave Kleiman [EMAIL PROTECTED] www.netmedic.net -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Damien O'Rourke Sent: Friday, March 21, 2003 11:14 To: [EMAIL PROTECTED] Subject: Cryptoproce

RE: Russia Intercepts US Military Communications?

2003-03-31 Thread dave
ey lock on and start tracking you. Notice I said "daily" basis. Might give a hint to how they "ran out". Dave _ Dave Kleiman [EMAIL PROTECTED] www.netmedic.net -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behal

RE: Run a remailer, go to jail?

2003-03-31 Thread dave
because of ignorant voters and politicians. It will: A) Make a lot of attorneys rich. B) Get torn apart by case law, after making said attorneys rich. But that is just my opinion :) Dave _ Dave Kleiman [EMAIL PROTECTED] www.netmedic.net -Original Message- From

Re: NSA tapping undersea fibers?

2001-05-28 Thread Dave Emery
g the cable or dealing with the rivers of data it contains. -- Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18

Quantum encryption secures high-speed data stream

2002-11-07 Thread Dave Qi
very interesting. http://www.eetimes.com/story/OEG20021107S0031 - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Re: Did you *really* zeroize that key?

2002-11-09 Thread Dave Howe
Bill Frantz wrote: > There is a common example of this corner case where the memory is > paged. The page containing the key is swapped out, then it is read > back in and the key is overwritten, and then the page is deallocated. > Many OSs will not zero the disk copy of the key. Given the nature of

Re: Research signals safer smart cards

2002-12-10 Thread Dave Paris
On Tuesday, Dec 10, 2002, at 08:48 US/Eastern, Eugen Leitl wrote: http://www.theregister.co.uk/content/55/28489.html Research signals safer smart cards By ComputerWire Posted: 09/12/2002 at 22:49 GMT Cryptography Research Inc, the company behind the design of the SSL v3.0 protocol that is

A talk on Intellectual Property and National Defense

2003-02-04 Thread Dave Farber
systems in which case DRM will most likely be broken endlessly. Comments? Dave Ps please excuse the inability to hear the questions from the floor, I recorded it will a small digital recorder on the podium. From: Dave Farber <[EMAIL PROTECTED]> Subject: [IP] Streaming REAL Audio now availa

Re: A talk on Intellectual Property and National Defense

2003-02-04 Thread Dave Farber
Sorry that is not what I said. Where did you get that from the above? On 2/4/03 11:28 AM, "Trei, Peter" <[EMAIL PROTECTED]> wrote: >> Adam Shostack[SMTP:[EMAIL PROTECTED]] writes: >> >> I believe that DRM systems will require not just an authorized boot >> sequence, but a secure remote attestati

Re: Columbia crypto box

2003-02-08 Thread Dave Emery
d procedures (and even hardware) to prevent anyone in possession of the shuttle crypto equipment from exploiting any keys or other information that was there. -- Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass. PGP finge

Re: AES-128 keys unique for fixed plaintext/ciphertext pair?

2003-02-24 Thread Dave Howe
Hmm. another simpler theory to remove Shannon from the discussion. assume that the original assertion is correct - that for each plaintext p and each cyphertext c there exists only one key k that is valid to map encrypt(p,k)=c. In this case, for each possible cyphertext c, *every* possible plainte

Re: AES-128 keys unique for fixed plaintext/ciphertext pair?

2003-02-24 Thread Dave Howe
Ed Gerck wrote: > This may sound intuitive but is not correct. Shannon proved that if > "n" (bits, bytes, letters, etc.) is the unicity distance of a > ciphersystem, then ANY message that is larger than "n" bits CAN be > uniquely deciphered from an analysis of its ciphertext -- even though > that

Re: Columbia crypto box

2003-03-05 Thread Dave Emery
ed in order to protect sensitive military links. -- Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 - The Cryptograph

Re: Active Countermeasures Against Tempest Attacks

2003-03-08 Thread Dave Emery
is ending as both optical and rf TEMPEST is much easier with raster scan pixel at a time CRT displays than it is with modern more parallel flat panel display designs. -- Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F

CTKS?

2003-03-25 Thread Dave Harte
Change the Key Stupid ? Just a nice simple question. I have previously implemented a process to generate new dsa/rsa keys for ssh and transfer them over the existing encrypted session with time interval t, the following connection will use the new keys & so forth.. The reason behind this wa

Re: Russia Intercepts US Military Communications?

2003-03-31 Thread Dave Howe
reusch wrote: > Via the Cryptome, http://www.cryptome.org/, "RU sure", look > at http://www.aeronautics.ru/news/news002/news082.htm. > I'm amazed at their claims of radio interception. One would > expect that all US military communications, even trivial ones, > are strongly encrypted, given the eas

Re: Run a remailer, go to jail?

2003-03-31 Thread Dave Emery
s worrisome to some of us working on software defined radio code in Mass... which might or could be used in ways that might be found illegal under this bill. -- Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493 PGP fing

Re: Run a remailer, go to jail?

2003-04-01 Thread Dave Emery
n this list in the Boston area there is a hearing scheduled on the Mass Bill at 10 Am in Room 222 of the Mass State House in Boston. It was introduced in Mass by a Rep Stephen Tobin of Boston and listed on the state website as "legislation to establish a crime of illegal internet and br

Re: Run a remailer, go to jail?

2003-04-01 Thread Dave Emery
On Tue, Apr 01, 2003 at 12:43:23PM -0500, Derek Atkins wrote: > Dave Emery <[EMAIL PROTECTED]> writes: > > > For those on this list in the Boston area there is a hearing > > scheduled on the Mass Bill at 10 Am in Room 222 of the Mass State House > > in

Re: Effective and ineffective technological measures

2001-07-29 Thread Dave Archer at pobox.com
ou're already familiar with to something new. There's a striking number of parallels between the CSA and the DMCA and I suggest reading them both together to get a sense of what the DMCA will mean in reality. Why, the CSA even