Re: your mail

2002-05-31 Thread measl
On Thu, 30 May 2002, Natalia wrote: QUIT More specific please? Quit diddling my data? Quit typing so loud after 10:00pm? Quit my job??? -- Yours, J.A. Terranson [EMAIL PROTECTED] If Governments really want us to behave like civilized human beings, they should give serious

[no subject]

2002-05-31 Thread Natalia
QUIT

Public support for federal workers falls to pre-Sept. 11 level

2002-05-31 Thread Declan McCullagh
3. Public support for federal workers falls to pre-Sept. 11 level By Brian Friel Americans support federal workers and trust the government less today than they did immediately after the Sept. 11 terrorist attacks, a new survey shows. The survey, issued Thursday by the Brookings Institution's

How can i check the authenticity of a private key

2002-05-31 Thread surinder pal singh makkar
Hi List, I am a newbie in cryptography. What I have learnt till now is that in assymeric cryptography scenario we have a private key and we generate the public key corresponding to it and then we send it to the central agency. Suppose after sometime I have a private key and the public key. Is

Re: CDR: Re: sources on steganography

2002-05-31 Thread Hector Rosario
i guess my sense of humor was missed by most of you. i might have to practice some more before going public unless i remain anonymous (although it might be too late now). h On Thu, 30 May 2002 [EMAIL PROTECTED] wrote: Jesus christ Hector! What the fuck are you planning to be when you grow

Re: How can i check the authenticity of a private key

2002-05-31 Thread Mike Rosing
On Fri, 31 May 2002, surinder pal singh makkar wrote: I am a newbie in cryptography. What I have learnt till now is that in assymeric cryptography scenario we have a private key and we generate the public key corresponding to it and then we send it to the central agency. You don't have to

Re: How can i check the authenticity of a private key

2002-05-31 Thread gfgs pedo
hi, I was helping a friend if mine with rsa key generation.if it helps u here it is. I am posting the mail which i sent to him. 1:Choose 2 large prime numbers p q 2:choose n=p*q z=(p-1)*(q-1) 3:choose a number relatively prime to z anc call it d. two numbers (a,b) are said to be

Re: F.B.I. Given Broad Authority to Monitor the Public

2002-05-31 Thread Bill Stewart
F.B.I. Given Broad Authority to Monitor the Public By THE ASSOCIATED PRESS WASHINGTON (AP) -- Attorney General John Ashcroft on Thursday gave the FBI broad new authority to monitor Internet sites, libraries, churches and political organizations, calling restrictions on domestic spying

RE: FC: Hollywood wants to plug analog hole, regulate A-D conve rters

2002-05-31 Thread Trei, Peter
-- From: Nomen Nescio[SMTP:[EMAIL PROTECTED]] Sent: Thursday, May 30, 2002 12:20 AM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: FC: Hollywood wants to plug analog hole, regulate A-D converters Peter Trei writes: My mind has been boggled, my

Bit commitment with hashes in Applied Cryptography

2002-05-31 Thread Jason Holt
In Applied Cryptography, p. 87 (2nd ed., heading Bit Commitment Using One-Way Functions) Schneier specifies that Alice must generate 2 random bit strings before hashing, and then send one along with the hash as her commitment: commitment = H(R1, R2, b), R1 Then she sends R2 and her bit to

Re: F.B.I. Given Broad Authority to Monitor the Public

2002-05-31 Thread Tim May
On Friday, May 31, 2002, at 02:12 AM, Bill Stewart wrote: If Ashcroft wants his underlings to monitor the internet, TCP/IP will let him do lots of things, and Bugs will let him do more, but if he needs cooperation from ISPs or other online service or content providers, his choices are either

RE: Re: When encryption is also authentication...

2002-05-31 Thread cypherpunk_reader
I ain't got that much schooling in these here matters, but it seems to me that in terms of the agreements, online agreements are pretty slacking when it comes to verifying that the end user actually read the document. Most agreements online take advantage of the fact that a user is going to skip

Re: When encryption is also authentication...

2002-05-31 Thread Jason Holt
Ian Grigg wrote: [...] SSL for commerce is readily in place without batting an eyelid these days. Costs are still way too high. This won't change until browsers are shipped that treat self-signed certs as being valid. Unfortunately, browser manufacturers believe in cert-ware for a

Re: When encryption is also authentication...

2002-05-31 Thread David Howe
Mike Rosing [EMAIL PROTECTED] wrote: Having it be transparent where the user doesn't need to know anything about how it works does not have to destroy the effectiveness of digital signatures or crypto. When people sign a document they don't know all the ramifications because few bother to