Re: Export control of Java VM ??

1999-12-03 Thread bram
On Thu, 2 Dec 1999, Ron Rivest wrote: > Here's a thought exercise: > > What happens if someone applies for an export license for a Java > Virtual Machine, which he intends to use as an "encryption routine"? > The idea (which is not new) is that a Java program (Java byte code) > would be the "key

Re: New Yorker article on NSA surveillance, crypto regs

1999-12-03 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, Declan McCullagh wri tes: > While much of it resonates as true, the timing -- just before crucial > oversight hearings and concerns about illegal NSA spying -- might be a > little coincidental: > http://www.wired.com/news/politics/0,1283,32770,00.html > > Last w

crypto legislation in India

1999-12-03 Thread Udhay Shankar N
I wrote, about the proposed IT legislation in India: >there is apparently a draft of the bill on the web, but I can't seem to find it at at http://it-taskforce.nic.in/ It is up at http://www.mit.gov.in/it-bill.htm - this may undergo further changes, however. Udhay -- __

Re: Semantic Forests, from CWD (fwd)

1999-12-03 Thread Eugene Leitl
Steven M. Bellovin writes: > The problem, from the perspective of an intelligence agency, is figuring out > what to listen to. Let's do some arithmetic. > > The product you cite requires at least a 133 Mhz Pentium; 200 Mhz preferred. > How many such chips are needed? Well, according t

Re: [transhumantech] Re: Universal Quantum Computers

1999-12-03 Thread eugene.leitl
From: Michael Nielsen <[EMAIL PROTECTED]> On Thu, 2 Dec 1999 [EMAIL PROTECTED] wrote: > > From: dmolnar <[EMAIL PROTECTED]> > > On 3 Dec 1999, lcs Mixmaster Remailer wrote: > > > NTRU is a lattice based system. Solving these systems involves some > > linear algebra and matrix operations. T

Re: New Yorker article on NSA surveillance, crypto regs

1999-12-03 Thread Dave Emery
On Thu, Dec 02, 1999 at 06:08:46PM -0500, Steven M. Bellovin wrote: > In message <[EMAIL PROTECTED]>, Declan McCullagh wri > tes: > > > While much of it resonates as true, the timing -- just before crucial > > oversight hearings and concerns about illegal NSA spying -- might be a > > little coinc

looking for encrypted login program for NT

1999-12-03 Thread Perry E. Metzger
Hey, all, I'm looking for an encrypted remote login program for NT. I just need a terminal window running cmd.exe on the NT box -- I can deal without having remote GUI access. Is there anything out there right now? I know there is no commercial supported SSH server for NT (or is there?) -- Per

Bluetooth gets more promoters

1999-12-03 Thread eugene.leitl
From: Gregory Alan Bolcer <[EMAIL PROTECTED]> I like the encryption tagline. Bluetooth developers conf is in LA next week. Anyone going ? http://www.pcworld.com/pcwtoday/article/0,1510,14098,00.html Unlike the spec espoused by the Infrared Data Association, which has no se

Re: Semantic Forests, from CWD (fwd)

1999-12-03 Thread David Honig
At 05:01 PM 12/2/99 -0800, Eugene Leitl wrote: >Steven M. Bellovin writes: > > > The problem, from the perspective of an intelligence agency, is figuring out > > what to listen to. Let's do some arithmetic. What fraction of calls could be known to be boring by a system which knows (or can infe

Re: Siemens German Digital Signature Chip Hacked

1999-12-03 Thread Bodo Moeller
Peter Gutmann <[EMAIL PROTECTED]> in ulf.cryptography: [...] > In any case what makes the SLE66 a more interesting target than most is that > it's sort of certified at ITSEC E4 with an assurance level of high. E4 is an assurance level, too; "E4" is about confidence in correctness (with assurance

PRESS RELEASE: A project to improve and commercialize GnuPG, the GNU Privacy Guard

1999-12-03 Thread Stefan Kelm
Please take note of the following press release: [http://www.gnupg.de/presse.en.html] PRESS RELEASE -- A project to improve and commercialize GnuPG, the GNU Privacy Guard -- Project management: GUUG, the German Unix User Group In cooperation with: G-N-U GmbH LinuxLand International