Might be better off having another crack at the Beale Cipher instead:
http://www.und.nodak.edu/org/crypto/crypto/resources.html
Regards,
Greg Reynolds
Compucom
[EMAIL PROTECTED] wrote:
>
> I wrote the author of the challenge. He responded (quoted with
> permission)
>
>
>
> If you had rece
The FCC issued yesterday its detailed definitions of what types of
services are and are not subject to CALEA requirements:
http://cryptome.org/fcc101299.txt
This was issued in an attempt is to answer questions from
respondents about what is a "telecommunications carrier."
Excerpts:
"5. CALE
Dear Listmembers!
Sorry for crossposting. The Call for Participation below
might be of interest for you. To register, please visit
http://www.cqre.net . You might want to note that the
early bird registration period already expires on Oct. 22,
which is less than two weeks from now.
I would b
At 00:03 10/13/1999 -0400, Perry E. Metzger wrote:
>
>I thought this forward from "Interesting People" would be of interest
Perry,
This followup might be relevant too. Has the FBI ever publicly weighed in
on an IETF debate before? Are there any implications here in other areas,
such as taxes, c
In message <[EMAIL PROTECTED]>, Declan McCullagh wr
ites:
>
> This followup might be relevant too. Has the FBI ever publicly weighed in
> on an IETF debate before? Are there any implications here in other areas,
> such as taxes, content, or encryption?
There are clearly many aspects to this qu
Another point to consider is that if the CALEA standards are arrived
at in an open and public manner, it could be made easy to tell whether
or not a given device is implementing them, and one could then use the
CALEA status of a device as part of the purchasing decision.
If the CALEA protocol is
On Wed, 13 Oct 1999, Steven M. Bellovin wrote:
>< . . . . >
> So -- how should the back door be installed? In the protocol? In the
> telco endpoint? Is it ethical for security people to work on
> something that lowers the security of the system? Given that it's
> going to be done anyway, is
"Steven M. Bellovin" <[EMAIL PROTECTED]> writes:
>So -- how should the back door be installed? In the protocol? In the telco
>endpoint? Is it ethical for security people to work on something that lowers
>the security of the system? Given that it's going to be done anyway, is it
>ethical to ref
In message <[EMAIL PROTECTED]>, "P.
J. Ponder" writes:
>
> Is it a given that IETF standard protocols will contain backdoors? I
> support the idea of bringing the issue before the IETF. Surely the vast
> majority will oppose weakening the protocols.
>
No, it is by no means a settled questi
"paul a. bauerschmidt" <[EMAIL PROTECTED]> writes:
> neat question:
>
> http://www.arcot.com/arcot_ieee.pdf
>
> a method of protecting private keys using camouflage, in software, to
> prevent dictionary attacks.
>
> one password will decrypt correctly, many other passwords will produce
> a
Steven M. Bellovin writes:
> So -- how should the back door be installed? In the protocol? In the telco
> endpoint? Is it ethical for security people to work on something that lowers
> the security of the system? Given that it's going to be done anyway, is it
> ethical to refrain, lest i
11 matches
Mail list logo