MI6 Ciphers and Comsec

2000-07-29 Thread John Young
Stephen Dorril's 1999 book on MI6 (just out in the US) alludes to several ciphers and communications security methods whose names he has disguised on legal advice, presumably to avoid violation of Britain's Official Secrets Act. We would appreciate receiving information on these ciphers and met

PGP ADK Bug Fix

2000-08-26 Thread John Young
Cryptome offers the ADK bug-fixed PGP Freeware 6.5.8: http://jya.com/pgpfree/PGPFW658Win32.zip (7.8MB) http://jya.com/pgpfree/PGPFW658Mac_sit.bin (5.6MB) Analyses of the ADK fix and any others most welcome.

Re: PGP ADK Bug Fix

2000-08-27 Thread John Young
Anrold Reinhold wrote: >How hard would it be to filter the public key servers for unsigned >ADKs and either notify the keyowner or just remove the unsigned ADKs? It might be possible to filter the unsigned ADKs from key servers, however, it is not clear if the bug discovered is all there is to

Unified Cryptologic Architecture

2000-10-18 Thread John Young
The bibliography of an NSA reorganization report released today lists several entries under "Unified Cryptologic Architecture" as well as a "U.S. Cryptologic Strategy - Preparing for the 21st Century." There is also a citation of "SINEWS - GCHQ Modernization and Change Program." We would appreci

DMCA Final Rule

2000-10-27 Thread John Young
We offer the US Digital Millennium Copyright Act Final Rule on Access Control Circumvention: http://cryptome.org/dmca102700.txt (149KB) An excerpt on why there will be no exemption for circumventing access to DVDs by tools such as DeCSS: http://cryptome.org/dmca-dvd.htm (15KB) The two

Re: Carnivore draft report released

2000-11-22 Thread John Young
This one seems secure: the redacted parts are deleted not overwritten. We've converted the Executive Summary and Recommendations to HTML: http://cryptome.org/carnivore-rev.htm

Carnivore Report

2000-11-22 Thread John Young
We offer an HTML version of the Carnivore technical review report released yesterday by the Department of Justice (without appendices): http://cryptome.org/carnivore.rev.htm (164KB text, 8 images) One notable conclusion about Carnivore's shortcomings and why its code should not be released

Re: UK intelligence agencies want 7 years of records of all phone calls, emails and internet connections

2000-12-04 Thread John Young
Clive Feather wrote: >Calling this "NCIS carnivore" is misleading. It's concerned with >transaction logs (who logged in when, web site logs, the sort of thing >covered as "communications data" in RIP). Nothing to do with the contents >of phone calls or email. > >I've been aware of these proposals

What's Up with AES FIPS

2000-12-29 Thread John Young
NIST states on its Web site that a draft FIPS for AES would be issued for comment "shortly after announcement of the winner (probably in November 2000)." Anything scandalous behind the delay?

Cryptographic Algorithm Metrics

2001-01-03 Thread John Young
Last summer, at a workshop on "Security Metrics," conducted by NIST's Computer System Security and Privacy Advisory Board, Landgrave Smith, Institute of Defense Analysis, reported on a pilot study of "the metrics used for determining the strength of cryptography." http://csrc.nist.gov/csspab/j

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread John Young
Yes, the one-time pad. However, I wondered if Smith was hinting at another cipher(s) not yet publicized, perhaps computational -- or more exotic technology such as quantum, DNA, ultra-spectral and beyond. The workshop's purpose was to discuss what security standards might be established to assure

NONSTOP Crypto Query

2001-01-12 Thread John Young
One of the Tempest FOIA docs NSA released recently concerns NONSTOP, a term whose definition is classified as SECRET. About half of the document, NACSEM 5112, "NONSTOP Evaluation Techniques," has been redacted, and we'll publish it soon. >From the clear text, NONSTOP appears to refer to prote

Re: NONSTOP Crypto Query

2001-01-13 Thread John Young
Joel McNamara first told me about NONSTOP and its commonly associated classified codeword, HIJACK, both somehow related to Tempest. When you do a search on either of them you get hundreds (or 1000s) of hits for the generic terms "non-stop" and "hi-jack" but few entries for the codewords, and t

NONSTOP Doc Up

2001-01-14 Thread John Young
NSA's "NACSEM 5112 NONSTOP Evaluation Techniques," Reprinted July 1987, released under FOIA: http://cryptome.org/nacsem-5112.htm (196K, 3 images) About half of the >100-page document has been redacted, so brace for the mangle.

Re: NONSTOP Crypto Query

2001-01-15 Thread John Young
I believe the main reason Peter Wright wanted unconventional snooping devices was to avoid detection by sweepers who regularly checked for the usual, known devices. Intercepting signals from radiated objects was one of those methods for it avoided having to plant a device within the targeted s

MPAA v. 2600 - Appeal Brief of Amici Curiae

2001-01-24 Thread John Young
We offer James Tyre's Brief of Amici Curiae on behalf of 17 cryptographers, professors and scientists, for appeal of the MPAA v. 2600 judgment: http://cryptome.org/mpaa-v-2600-bac.htm The amici: Harold Abelson Andrew W. Appel Dan Boneh Edward W. Felten Robert Harper Andy Hertzfeld Brian Kern

Cryptographers Amici Briefs

2001-01-30 Thread John Young
For appeal of the MPAA v. 2600 decision: Brief Amici Curiae of Steven Bellovin, Matt Blaze, Dan Boneh, Dave Del Torto, Ian Goldberg, Bruce Schneier, Frank Andrew Stevenson, David Wagner: http://www.2600.com/dvd/docs/2001/0126-crypto-amicus.txt Brief Amicus Curiae of Arnold Reinhold: h

FCC Wiretap Rule

1998-11-06 Thread John Young
FCC has issued its Notice of Proposed Rulemaking on CALEA wiretap provisions, approved on October 22: http://jya.com/fcc98282.htm (243K) Zipped: http://jya.com/fcc98282.zip (67K) Lengthy discussion of petitioners' (CDT, EFF, telcos, others) objections and FBI's responses.

Wassenaar Statement

1998-12-04 Thread John Young
The Secretariat of The Wassenaar Arrangement has issued brief public docs on the recent meeting: http://jya.com/wa-state98.htm Only one brief mention of encryption: "8. The WA agreed control list amendments to take into account recent technological developments. The amendments to the

AU Wassenaar

1998-12-07 Thread John Young
From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] cc: [EMAIL PROTECTED], [EMAIL PROTECTED] Date: Mon, 7 Dec 1998 16:58:49 +1000 Subject: Wassenaar changes [OK to repost to crypto lists and Cryptome - dant] I spoke this afternoon with one of the Australian delegates at the Wassenaar meeting, an offi

Wassenaar News

1998-12-07 Thread John Young
We spoke with Igor at the WA today to ask about the implementation report Caspar Bowden said on UK Crypto would be coming shortly. It seems that Dirk Weicke, the person preparing it (whom Caspar queried), is out sick and won't return to work until Thursday. Another person working on the report,

Re: Building crypto archives worldwide to foil US-built Berlin Walls

1998-12-08 Thread John Young
In response to John Gilmore's call for a foil to US-Wassenaar restrictions acoming, we've put up a preliminary list of international cryptography sources for mirroring: http://jya.com/crypto-free.htm This is a quick starter-kit and is far from comprehensive. Contributions welcome. Ken Willi

Baker on Gilmore's Wassenaar Foil

1998-12-08 Thread John Young
Response to a forward of John Gilmore's message to UK Crypto: Date: Tue, 8 Dec 1998 09:50:19 -0500 From: <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Subject: Re:Foil to Wassenaar : : I would only add this caution. I think John is wrong in giving legal advice that Wassenaar is not binding wit

Reinsch On Crypto/Wassenaar

1998-12-09 Thread John Young
Excerpt from a speech by BXA's William Reinsch on December 7, 1998, at the Practising Law Institute conference "Coping with U.S. Export Controls." Note final paragraph about detailed crypto session today -- no report on that yet. Full speech: http://jya.com/war120798-2.htm Also by him yesterda

Wassenaar/Crypto News

1998-12-09 Thread John Young
A BXA spokesperson said today that the text of the recent Wassenaar agreement had been received yesterday and it is now being prepared for release on the BXA website (www.bxa.doc.gov) maybe by the end of the week but maybe not until next week. She said she expected the US to be the first to p

Wassenaar Lists Up

1998-12-10 Thread John Young
The Wassenaar Arrangement has put up the Dec. 3 lists agreed to by members: http://www.wassenaar.org/List/Table%20of%20Contents%20-%2098web.html Most are in .DOC format. Thanks to TR: see also a version in HTML: http://www.fitug.de/news/wa/index.html

Re: ANSI standards for block ciphers?

1998-12-13 Thread John Young
This probably refers to the ANSI X9 financial standards committee, whose X9F Subcommittee on Data and Information Security devises cryptographic standards in cooperation with the global financial services community and various standards groups. See general info at the X9 home page: http://w

Re: Proposed wiretap laws in South Africa

1998-12-14 Thread John Young
Thanks to Alan Barrett for pointing to the provocative SA wiretap paper. And his critique is apt. We offer it in HTML: http://jya.com/za-esnoop.htm (364K) The "Review of Security Legislation" looks at electronic surveillance law in several countries -- South Africa, US, UK, France, German

NSA Org Chart

1998-12-18 Thread John Young
Thanks to Defense Information and Electronics Report we offer NSA's organizational chart, which was obtained by DI&ER under the FOIA: http://jya.com/nsa-chart.htm

Trust in Cyberspace

1998-12-22 Thread John Young
We offer the National Academy of Sciences September 1998 report, "Trust in Cyberspace," a 243-page survey of all security issues and technologies associated with the Internet and computer networks: http://jya.com/tic-intro.htm (Introduction only, 58K) http://jya.com/tic.htm (Full report

Re: ODS can export... what?

1998-12-23 Thread John Young
This is from ODS's press release. http://www.ods.com/news/121698.shtml A breakthrough technique, called Stream Recovery, resolves the conflicting requirements between a customer's need for complete privacy and their occasional need to diagnose communication problems, or to allow law

Re: Trust in Cyberspace

1998-12-23 Thread John Young
Thanks to Steven for noting that the doc is a prepub version. What's most impressive about the report is it's calm and careful study of networking security by those who appear to know what they're talking about compared to lurid reports by those who appear to want to frighten the public rather t

New Crypto Regs

1998-12-30 Thread John Young
Thanks to Ed Roback, NIST: BXA issued a press release today on new crypto regulations: http://www.bxa.doc.gov/press/98/1230encryption.html (copy below) The regs themselves are available today only in hardcopy in Washington DC on display at the Federal Register, but the electronic version wi

BXA Crypto Rule

1998-12-31 Thread John Young
BXA has issued today an interim rule on encryption items which implements the administration's September export policy announcement, and requests comments: http://jya.com/bxa123198.txt (79K)

Crypto Export Meet

1999-01-04 Thread John Young
[Federal Register: January 4, 1999 (Volume 64, Number 1)] --- DEPARTMENT OF COMMERCE Bureau of Export Administration President's Export Council Subcommittee on Encryption; Notice of Open Meeting The President's Export Co

NSA Means and Methods

1999-01-11 Thread John Young
Seymour Hersh reports on NSA means and methods stolen by Jonathan Pollard for the Israelis in the January 18 issue of The New Yorker: http://jya.com/traitor.htm (43K) Excerpts: The data passed along by Pollard included detailed information on the various platforms -- in the air, on land, an

Re: Cayley-Purser

1999-01-13 Thread John Young
Clive Feather asked about news of an Irish teenager who has devised a fast crypto algo. William Whyte at Baltimore Technologies in Dublin -- where Sarah Flannery worked recently and got a boost from the cryptographers there -- gave a brief rundown on her invention on mail list UKCrypto. There

NIST: FIPS 46-3 for 3DES

1999-01-15 Thread John Young
NIST today issued an RFC to replace FIPS 46-2 with a new FIPS 46-3 to provide for the use of Triple DES as specified in the ANSI X9.52 standard: http://jya.com/nist011599.txt

NIST Credits Deep Crack

1999-01-15 Thread John Young
NIST credits Deep Crack as the reason for proposing using 3DES in lieu of DES in its new FIPS 46-3 (previously posted : Quote: Recently claims have been made of a special-purpose hardware based attack on the DES. In light of this most recent attack, NIST can

FIPS 46-3 Not Yet

1999-01-15 Thread John Young
Jim Foti's machine at NIST says that due to bad weather NIST is closed today, so the new FIPS 46-3 on 3DES could not be provided on the FIPS site as promised in today's Federal Register notice. He says he'll try to get it up tomorrow, or, at the latest, on Monday.

France Allows 128 Bit Crypto

1999-01-19 Thread John Young
The French Prime Minister today announced that due to the threat of espionage and invasion of privacy France will allow encryption strength up to 128 bits: http://www.premier-ministre.gouv.fr/PM/D190199.HTM [Excerpt; Babelfish English below.] (c) Le troisième chantier législatif concerne la c

Draft FIPS 46-3 Up

1999-01-20 Thread John Young
Jim Foti at NIST has put the Draft FIPS 46-3 at: http://csrc.nist.gov/fips/dfips46-3.pdf (209K) We offer an HTML version: http://jya.com/dfips46-3.htm (49K + 35K images)

Rivest Patent

1998-11-13 Thread John Young
Ron Rivest received on November 10 "US Patent 5835600: Block encryption algorithm with data-dependent rotations:" http://jya.com/rivest111098.htm (22K)

Info Age Crime Terror and War

1998-11-13 Thread John Young
Senator Kyl has issued a long report, "Crime, Terror & War: National Security and Public Safety in the Information Age," which recounts his Subcommittee's hearings and recommendations on encryption, Y2K, terrorism, info war, domestic preparedness, wiretap, and more: http://jya.com/ctw.htm (9

Re: Pop Count Instruction and crytanalysis

1999-01-29 Thread John Young
Thanks to John McKay and others for the reference to interesting features of supercomputers concerning "sideways add" or pop-count instruction -- and possible applications to cryptography and cryptanalysis. We found that S.H. Lavington's 1978 Comm ACM paper on the Manchester Mark I and Atlas is

Call for Contributions

1999-02-04 Thread John Young
We humbly ask for contributions for expenses of operating Cryptome <http://jya.com/crypto.htm>. Checks made to John Young: John Young JYA/Urban Deadline 251 West 89th Street, Suite 6E New York, NY 10024 Thanks very much.

US Crypto 5 + AU

1999-02-09 Thread John Young
We offer five recent statements on US crypto policy by the House Armed Services Committee, Senator Burns, AG Reno, FBI's Freeh and John Gilmore: http://jya.com/us-crypto5.htm We'd appreciate pointers to other statements and reactions to the five. Senator Burns' office says a draft of a crypt

RSA v. C2

1999-02-10 Thread John Young
Dan Tebbutt wrote an excellent piece yesterday in The Australian on RSA's fight with C2 for the IP of Eric Young and Tim Hudson, the covert process of getting AU approval for export of crypto and what it may mean for sweetheart arrangements to bypass global controls (no, there's no hint of GAK, y

ACLU Brief for Junger

1999-03-11 Thread John Young
We offer the recent ACLU brief filed in support of Peter Jungers's appeal in his suit against the USG for denying his application to BXA to publish crypto code on the Net: http://jya.com/pdj-brief.htm (112K) An impressive document. Which cites many of the leaders of the field, some of whom d

French Crypto Decrees

1999-03-20 Thread John Young
The French Prime Minister signed detailed decrees allowing strong encyption on March 17 which were officially published yesterday: http://jya.com/decret031799.htm (34K) They are in French, though brief, and an English version would be appreciated.

English of French Decrees

1999-03-29 Thread John Young
Thanks to Peter Kaiser we offer an English translation of the recent French crypto decrees: http://jya.com/fr-decrees.htm (30K)

US Brief in Junger v. Daley

1999-04-26 Thread John Young
We offer the US Proof Brief arguing against Peter Junger's appeal of the Ohio district court decision: http://jya.com/pdj-usa-brief.htm (109K)

Shamir's TWINKLE

1999-05-05 Thread John Young
From: Adi Shamir <[EMAIL PROTECTED]> Date: Wed, 5 May 1999 09:57:33 +0300 To: [EMAIL PROTECTED] Subject: Re: TWINKLE Hi, The early version of the paper was quietly circulated to a small number of factoring experts and colleagues to get their comments. I'll probably write an expanded version soo

Bernstein Opinion Up

1999-05-06 Thread John Young
Thanks to Cindy Cohn: http://jya.com/bernstein-9th.htm Or from the 9th Court of Appeals: http://www.ce9.uscourts.gov/web/newopinions.nsf/f606ac175e010d64882566eb0065 8118/febd2452a8a4d79b8825676900685b71?OpenDocument

1,000 Free Crypto Sites

1999-05-07 Thread John Young
Heeding Hugh Daniels' call today to set up 1,000 US crypto sites free of unconstituional export restrictions as provided by the Bernstein opinion, we invite contributions of unlimited-strengh encryption programs and/or links to such programs for a new US section for unrestricted cryptography at

A5/1 Crack

1999-05-10 Thread John Young
"A Pedagogical Implementation of A5/1," by Marc Briceno, Ian Goldberg, and David Wagner. http://jya.com/a51-pi.htm "With COMP128 broken and A5/1 published below, we will now turn our attention to A5/2. The latter has been acknowledged by the GSM community to have been specifically designed

PECSENC Agenda

1999-05-12 Thread John Young
An updated agenda for the May 14 meeting in DC of the President's Export Council Subcommittee on Encryption (PECSENC) has been provided by Lisa Ann Carpenter, Committee Liaison Officer (202-482-2583): Opening remarks by the new chairman, William Crowell (ex-Deputy DIRNSA) Encryption initi

PECSENC Docs

1999-05-17 Thread John Young
We offer several documents from the PECSENC meeting of February 14, 1999: 1. Agenda 2. Members of PECSENC 3. Memorandum on PECSENC Action Plan 4. Executive Summary, PECSENC Meeting Open Session, March 12, 1999 5. Candid Meeting Comments (backdoor algorithms) http://jya.com/pecsenc051499.htm

PECSENC Docs Date

1999-05-17 Thread John Young
That's docs from the PECSENC meeting of May 14, 1999. http://jya.com/pecsenc051499.htm

Re: US spying on Europe

1999-05-18 Thread John Young
The author of the STOA report on Echelon, Duncan Campbell, offers the report: http://www.iptvreports.mcmail.com/stoa_cover.htm We offer a zipped version Duncan provided: http://jya.com/ic2000.zip (961K) There are two others in the series which are now completed of comparable interest,

Jospin's Crypto coup

1999-05-24 Thread John Young
A report on how 128-bit crypto was liberated in France. http://jya.com/jospin-coup.htm An outfoxed French spook warns, "Free crypto, it will be the end of the State."

RFC on Crypto Research

1999-05-27 Thread John Young
There's an RFC today from the US Copyright Office, the National Telecommunications and Information Administration and the Commerce Department on the adverse impact on encryption reasearch of the Digital Millennium Copyright Act: http://jya.com/ntia052799.txt This addresses an issue Gene Spa

Junger Reply to Gov Brief

1999-05-27 Thread John Young
We offer Peter Junger's reply to the government's brief in his appeal to the 6th Circuit: http://jya.com/pdj-reply6th.htm Here's a swell petard hoisting excerpt: The government has introduced evidence that the use of encryption "by foreign intelligence targets 'can have a debilitating effe

Germany Frees Crypto

1999-06-02 Thread John Young
The German cabinet today released a policy statement on the unrestricted use of encryption (an English translation would be welcome): http://www.bmwi.de/presse/1999/0602prm1.html It says, pardon my German, that for worldwide protection against economic espionage and electronic interception

Re: Germany Frees Crypto

1999-06-03 Thread John Young
David Conrad wrote: >> 5. The Federal Government attaches importance to international >>cooperation on encryption policy. It encourages market-driven, >>open standards and interoperable systems and will work to >>strengthen multilateral and bilateral cooperation. > >Does this mean th

Re: Germany Frees Crypto

1999-06-03 Thread John Young
Peter Haefner has provided an English translation of the full German statement, "Cornerstones of German Encryption Policy": http://jya.com/de-crypto-all.htm

PECSENC Meet

1999-06-10 Thread John Young
Federal Register, 9 June 1999 DEPARTMENT OF COMMERCE Bureau of Export Administration President's Export Council Subcommittee on Encryption; Open Meeting The President's Export Council Subcommittee on Encryption (PECSENC) will meet on June 25, 1999, at the U.S. Department of Commerce, Herbert

A5 Papers

1999-06-25 Thread John Young
We're trying to obtain copies of the following confidential papers and would appreciate those at universities or other repositories to check to see if the papers are available there. Simon Shepherd has written that he regrets he cannot release them, and IEE publications writes that the org does

Re: NPR story on crypto...

1999-06-26 Thread John Young
Vin McLelland wrote: >Nice article in USAToday, Will! > >You might find it useful to note -- and I'm open for correction on >this from anyone -- that the US Government's Bernstein brief is, I believe, >the first time the Govt has openly acknowledged that the export control >issue i

Crypto: Police v. Privacy

1999-07-12 Thread John Young
We offer Nick Ellsmore's exemplary paper, "Cryptology: Law Enforcement & National Security vs. Privacy, Security & The Future of E-Commerce": http://cryptome.org/crypto97-ne.htm (196K) It is also available in Zipped .DOC format: http://cryptome.org/crypto97-ne.zip (76K) For those who

US Urges Ban of Internet Crypto

1999-07-28 Thread John Young
The Austrian journal Telepolis today published a letter from Janet Reno to the German Justice Minister urging a ban of crypto products on the Internet. We've made a translation of the report which includes Reno's letter: http://jya.com/reno-ban.htm Here's an excerpt of Reno's letter: "Much w

Euro-Parl Surveillance Reports

1999-08-21 Thread John Young
We offer the European Parliament-sponsored reports which have been prepared as follow-up to the 1998 "Appraisal of the Technologies of Political Control." The four-part series is titled "Development of Surveillance Technology and Risk of Abuse of Economic Information (an appraisal of technologi

PECSENC Says Free Up Crypto?

1999-08-21 Thread John Young
John, Have you heard about this PECSENC recommendation cited by Dorothy Denning? I've written the PECSENC administrator about getting the recommendation. That's Jason Gomberg <[EMAIL PROTECTED]>. Could you try from your end? Thanks, John -- Date: Fri, 20 Aug 1999 13:49:07 -0400 From: [EMAIL

PECSENC Report Up

1999-08-25 Thread John Young
William Crowell has provided PECSENC's recommendations for revising encryption export regulations: http://cryptome.org/LIB42.htm He writes: "Attached are the recommendations of the PECSENC from our July meeting. These recommendations were sent to the BXA in July for consideration of the In

MSNSA Key Not News

1999-09-06 Thread John Young
Brian Gladman, a UK cryptographer, writes today on UK Crypto: I am always surprised about just how long it takes to recognise the political implications of simple technological decisions. The Microsoft CAPI issue is well over ***three years old*** and to illustrate this here is a URL for a paper

Sue MSNSA for Key?

1999-09-07 Thread John Young
Date: Mon, 06 Sep 1999 23:01:46 -0700 From: "Paul E. Merrell" <[EMAIL PROTECTED]> Organization: Lawyer To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> Subject: Does Microsoft's CryptoAPI key violate U.S. law? : : What follows is a copy of my post to a U.S.-based listserv for law office technical issu

Re: IP: IETF considers building wiretapping into the Internet

1999-10-13 Thread John Young
The FCC issued yesterday its detailed definitions of what types of services are and are not subject to CALEA requirements: http://cryptome.org/fcc101299.txt This was issued in an attempt is to answer questions from respondents about what is a "telecommunications carrier." Excerpts: "5. CALE

Bernstein Delay Motion

1999-10-19 Thread John Young
Thanks to Cindy Cohn we offer the USG's motion yesterday to delay en banc reargument in Bernstein: http://cryptome.org/bernstein-mot.htm A quote: "The revisions being implemented by the Department of Commerce entail extensive changes in the existing terms of the encryption export regulatio

TEMPEST Docs

1999-10-24 Thread John Young
We offer the first two transciptions of NSA FOIA-released TEMPEST-related information: NSTISSAM TEMPEST/1-92 - Compromising Emanations Laboratory Test Requirements, Electromagnetics - Appendix A: http://cryptome.org/nstissam1-92a.htm NSA/CSS Regulation 90-5, Technical Security Program h

CAPSTONE Specs

1999-11-01 Thread John Young
Thanks to Anonymous we offer the CAPSTONE (MYK-80) Specifications, August, 1995, about 1/3 redacted of parts still classified TOP SECRET UMBRA: http://cryptome.org/capstone.htm (40K text and 13 images) Or Zipped: http://cryptome.org/capstone.zip (text and images: 298K) This doc was rel

Flannery on Cayley-Purser/RSA

1999-11-11 Thread John Young
Thanks to Jean-Jacques Quisquater and Jean-François Misarsky we offer Sarah Flannery's September 1999 paper on the Cayley-Purser Algorithm and her comparison of it to the security and speed of RSA: http://cryptome.org/flannery-cp.htm She concludes that Cayley-Purser is as secure as RSA and so

HTML of flannery Paper

1999-11-13 Thread John Young
We've completed an HTML version of Sarah Flannery's paper, except for the Mathematica code; same URL: http://cryptome.org/flannery-cp.htm (48KB with image) William Whyte suggested that the successful attack on Flannery's algorithm carried out by Purser, Flannery and 'Whyte, appended to the

NYC Crypto Talk

1999-11-21 Thread John Young
For those in the NYC-area, Michael Anshel writes: I'm scheduled to speak to my colleagues in the Physics Dept at CCNY some of whom have co-taught with me Quantum Computing and Cryptography. The announcement is below. THE CITY COLLEGE OF THE CITY UNIVERSITY OF NEW YORK NEW YORK, NY 10031 DEPA

Re: fwd: $100 secure phones from Starium

1999-11-27 Thread John Young
Does delay, stealth mode, and visit from the MIB indicate that Starium has been CAVE-crippled in order to get a life-saving contract from the USG, like the coerced compliance of TMI in Canada Perry posted on? The future of the Web set out by Robert Cailliau, who cites France's beloved Mintel as

Hersh on NSA

1999-11-29 Thread John Young
Here's Seymour Hersh's article in The New Yorker of December 6 on NSA's troubles with the digital age: http://cryptome.org/nsa-hersh.htm (36K) Opening: "The National Security Agency, whose Cold War research into code breaking and electronic eavesdropping spurred the American computer re

Wassenaar Changes Crypto

1999-12-06 Thread John Young
On December 3 the Wassenaar members approved changes to the cryptography provisions of the WA: http://cryptome.org/wass120399.htm And enhanced enforcement: http://207.96.11.93/press/99/WassEnforce.html

Re: Wassenaar Revises Crypto

1999-12-06 Thread John Young
Oops, you're right. Whatever changes were made on December 3 this year apparently did not affect cryptography. Sorry for antsy. Ulf Möller wrote: >Did they really change anything now? This looks like the December 1998 (!) >list.

A5/1 Cryptanalysis Paper

1999-12-09 Thread John Young
Adi Shamir has provided "Real-Time Cryptanalysis of GSM's A5/1 on a PC, (Preliminary Draft)" by Alex Biryukov and Adi Shamir, December 9, 1999: http://cryptome.org/a5.ps (Postscript, 292K)

A5/1 Correction

1999-12-09 Thread John Young
Title correction on the A5/1 paper: "Real-Time Cryptanalysis of the Alleged A5/1 on a PC, (Preliminary Draft)" Note "the alleged' in lieu of "GSM's" used in Adi's initial announcment. http://cryptome.org/a5.ps (Postscript, 292K)

A5/1 Paper in HTML

1999-12-09 Thread John Young
For those unable to read Postscript we offer the Biryukov- Shamir A5/1 cryptanalysis paper in HTML: http://cryptome.org/a51-bs.htm (text, 44K; six images, 163K)

Re: US law makes it a crime to disclose crypto-secrets

1999-12-12 Thread John Young
Yes, classified documents have a wide range of markings, some of which may include the lengthy citation Arnold cites but not all, at least on not on every page. And there are surely some which have not been declassified which bear markings not yet seen in public. Special weapons docs reported

Re: Stasi code cracked

1999-12-13 Thread John Young
Christiane Schulzki-Haddouti, a German reporter with Telepolis who checked on the initial "decoding" of the Stasi archive in February 1999, writes that the decoding was technically not decryption but instead consisted of converting old code into one that could be emulated on a PC, comparable

DVD DeCSS Docs

2000-01-03 Thread John Young
To supplement Lucky's report here are other docs in the DVD DeCSS case: Original DVD CCA Complaint of December 28: http://cryptome.org/dvd-v-500.htm (64K) Nine Court filings by DVD CCA at December 29 hearing: http://cryptome.org/dvd-v-521.htm (194K) Zipped: http://cryptome.org/

Revised Draft Crypto Regs

2000-01-06 Thread John Young
Stewart Baker offers a Revised Draft of Encryption Export Regulations, dated December 17, which supecedes that issued on November 19, and is being circulated among industry groups for comments: http://www.steptoe.com/webdoc.nsf/Files/regs/$file/regs.pdf We offer an HTML version: http://cr

US Cyber Security Plan

2000-01-10 Thread John Young
Thanks to Will Rodger we offer the National Plan for Information Systems Protection, Executive Summary, released by the White House on January 7: http://cryptome.org/cybersec-plan.htm (109K) Zipped: http://cryptome.org/cybersec-plan.zip (32K)

Re: New Encryption Regulations have other gotchas

2000-01-15 Thread John Young
Phil Karn wrote: >I believe the anti-Tempest provisions have been in the export regs >for some time. Yes, but when did they appear? We're attempting to trace Tempest's origin -- not easy because of classification of so much stuff. One classified standard dates to 1967. A French article on Tempes

Bernstein Asks BXA to Clarify Crypto Regs

2000-01-23 Thread John Young
Cindy Cohn, lead Bernstein counsel, has provided a January 16 letter to BXA asking for clarification of the new crypto export regulations: http://cryptome.org/bernstein-bxa.htm The letter describes at length still unanswered questions about compliance; requests a formal BXA Opinion -- in pu

NSA Declassified

2000-01-24 Thread John Young
Noted intelligence author Jeffrey Richelson and the National Security Archives have obtained some 17 declassified documents from the NSA tracing its history and operations. One of them confirms for the first time in an official document the existence of Echelon (except for a thumbnail photo o

Re: NSA Declassified

2000-01-24 Thread John Young
Your points are valid for the AIA document. However, in the Navy document, Number 9, image 3, there is the phrase, "Maintain and operate an ECHELON site." Still, you may be right that none of this proves there is a program by that name, and it may be only a way of indicating an activity of a par

Re: DVD CCA Emergency Hearing to seal DeCSS

2000-01-26 Thread John Young
Up to 4 PM EST we've had no notice that the file has been "sealed." There have been over 26,000 downloads and they are now going out at 600 per hour.

  1   2   >