Re: Book on cryptography for programmers

2000-08-15 Thread Rick Smith
At 03:38 PM 8/10/00, Michael Paul Johnson wrote: >In case you haven't figured it out, yes, I am seriously contemplating >writing such a book. There's certainly a need for defensive programming books oriented towards security functions, and crypto functions in particular. On the other hand, th

Re: dbts: Lions and TEMPESTs and Black Helicopters (Oh, My!)

1998-11-04 Thread Rick Smith
>Robert Hettinga <[EMAIL PROTECTED]> writes: >> ... using an encrypted link with at least SSL, and, at some point, people >> will demand much cheaper and faster internet-level encryption ala IPSEC to >> move their money (and their other bits worth money) around. At 09:28 AM 11/3/98 -0800, EKR rep

Re: Preparing course `Intro to crypto with focus on e-commerce

1998-12-28 Thread Rick Smith
At 10:47 PM 12/26/98 +0200, Amir Herzberg wrote: > ... I'll appreciate any pointers to good available foils or really >good lecture notes (I did look up Rivest's, for example). Take a look at presentation files on my web site: http://www.visi.com/crypto/ They're all in PDF (originally FrameMa

Re: dbts: Lions and TEMPESTs and Black Helicopters (Oh, My!)

1998-11-05 Thread Rick Smith
I wrote: >> Let me raise another possible problem with substituting IPSEC for SSL -- >> does anyone *really* have an IPSEC implementation that interfaces as >> effectively with secure applications? ... And Robert Hettinga replied: >IPsec happens at the network layer, SSL between the transport l

Re: references to password sniffer incident

1999-03-08 Thread Rick Smith
At 02:29 PM 3/8/99 +1100, Greg Rose wrote: > For part of this, I wanted to >refer to the incident where someone mounted a password sniffer at a major >network hub (MAE-West?) a couple of years ago. But I haven't turned up >anything useful in a Web search. I didn't dream this incident, d

Re: MacOS 8.7 Security

1999-05-17 Thread Rick Smith
Arnold Reinhold quoted a site containing rumors about upcoming security features in Mac OS 8.7: > The security features controlling all of this will be very similar to >those used in OS X and are to be considered extremely secure. No external >testing has been applied yet, but Apple sources s

Re: entry level cryptography books

1999-06-02 Thread Rick Smith
At 06:10 PM 6/1/99 +0100, Markus Kuhn wrote: >Those who are more comfortable with reading German than Mathematics and >who are looking for a really entry-level book will enjoy > > Alfred Beutelspacher: Kryptologie. > Vieweg, 1996, ISBN 3-528-48990-1, 34.00 DEM, 179 p. Internet Cryptography has

Sen. John McCain

1999-06-28 Thread Rick Smith
Just got back from vacation in a low tech wilderness (the BWCA) and I didn't have a chance to pass this on sooner. Just before I left (Friday June 18) I met Senator John McCain at SCC's offices in San Jose. We talked about export controls. I went through the usual explanations and analogies to ex

Re: FBI Report on Cryptography

1999-07-06 Thread Rick Smith
I took the time to look at this report while stuck on an airplane (we use Northwest up here) and I'm astonished that the FBI can't do any better than this. They trotted out the same old anecdotes of this terrorist "recommending" crypto to friends and that investigation "encountering" encrypted fil

Re: PGP encryption

1999-07-20 Thread Rick Smith
>Hans asked: > >>When implementing PGP base encryption, is this implementation MUST use >>symetrically Algorithms ?? Is it possible to use only the >public/private key ? At 01:43 PM 7/19/99 -0600, [EMAIL PROTECTED] replied: >There currently isn't a way to do it under the OpenPGP Draft. Why wo

Re: House committee ditches SAFE for law enforcement version

1999-07-26 Thread Rick Smith
Declan McCullagh <[EMAIL PROTECTED]> writes: > >>> The sponsor of yesterday's amendment, Rep. Weldon, said that he wants to >>> have a classified briefing //on the House floor// to scare members into >>> voting his way. Look for killer amendments to SAFE to be offered during >>> that floor vote, p

Re: Subject: Re: Security Lab To Certify Banking Applications

1999-07-27 Thread Rick Smith
At 11:27 AM 7/27/99, Peter Gutmann wrote: >(Given that NT now has a UK E3 certification, I don't think you need to get >it recertified in the US, since it's transferrable to all participating >contries, so I don't think it'd have to be certified by the above lab). I'm not sure this is true. Th

Re: Security Lab To Certify Banking Applications

1999-07-27 Thread Rick Smith
Regarding the general direction of these comments >"William H. Geiger III" wrote: >> Well I have my doubts on this. Either they refuse to certify Microsoft & >> Netscape software and alienate 90% of the consumer market, or they do >> certify them making their certification worthless. At 04:

Re: Security Lab To Certify Banking Applications

1999-07-27 Thread Rick Smith
I wrote about Java-bashing relative to security in e-commerce: >>Naturally I understand the logic behind these, but it's a bit like saying >>"We won't sell anyone a car unless it's burglarproof." People use their >>cars quite a bit even though they're expensive and risk of being stolen. At 10:15

Re: US Urges Ban of Internet Crypto

1999-07-29 Thread Rick Smith
At 09:54 AM 7/29/99 -0700, Tom Perrine wrote: >Ever taken a look for pgp.2.6.x, Kerberos, SSH or other "controlled >software" available for anonymous FTP from .GOV and .MIL systems? A >few minutes with your favorite search engine is quite enlightening :-) What astonishes me is that some governm

Product Evaluations (was: Re: House committee ditches...)

1999-08-04 Thread Rick Smith
At 02:19 AM 8/3/99, Peter Gutmann wrote: >[1] There isn't any rule of thumb for the work involved in attaining the higher >assurance levels because it's done so rarely, although in terms of cost and >time I've seen an estimate of $40M for an A1 Multics (it never eventuated) >and DEC's

Re: IP: Clinton comes after the Internet by Joseph Farah

1999-08-10 Thread Rick Smith
At 10:44 AM 8/10/99 -0400, Dan Geer proposed an explanation: >2. we already have our draft conclusions in white paper >form and we need to have the appearance of due process I expect the conclusions can be inferred from that other recent Administration exercise: "Encryption: Impact on Law Enforc

Fingerprints and smart cards (was: going around the crypto)

1999-08-21 Thread Rick Smith
Peter Gutman said: >> Smart cards with thumbprint readers are one step in this >> direction, although they're currently prohibitively expensive. American Biometrics (www.abio.com) has their Biomouse II, which I once heard was supposed to retail around $250 or so. The old finger-only Biomouse sho

Formal Security Evaluation Survey/History

1999-09-17 Thread Rick Smith
The subject of government mediated evaluations of computer security products has come up a few times on this list, so I'm taking this opportunity to ask the readership for assistance in a survey I've been working on. I'm collecting information about security product evaluations under formal crite

Re: Export ?

1999-10-05 Thread Rick Smith
At 03:24 PM 9/30/99 -0400, Andy Maslar wrote: >At the risk of being flamed for being a hopeless newbie, or perhaps as >one asking a practical question about export regs, (something that seems >in bad taste lately) I will nevertheless proceed: > >Are hash functions (MD5 specifically) controlled by

Re: Internal vs external threats, any references?

1999-10-05 Thread Rick Smith
I said: >> If it's programmable it's vulnerable. Ben Laurie replied: >Oh, right. There's no attack you can defend against, right? One has to be careful with one's universal quantifiers. "There's no attack you can defend against." - false "There are defenses against some attacks." - true "Ther

Re: crypto camouflage in software

1999-10-11 Thread Rick Smith
>"paul a. bauerschmidt" wrote: >> one password will decrypt correctly, many other passwords will produce >> alternate, valid-looking keys to fool an attacker. >> >> is this an example of security through obscurity (a thought which many >> frown upon, it seems)? At 05:12 PM 10/8/99 -0700, Ed

Re: 56 Bits?????

1999-10-30 Thread Rick Smith
Regarding certain properties of the OS 9 crypto: *) Introducing crypto to the masses If they're putting crypto on the desktop that "the rest of us" can use, my hat goes off to them. Netscape pioneered "crypto to the masses" by hiding the operations entirely. If Apple has taken the next step and

Re: call for identification of some crypto devices

1999-11-11 Thread Rick Smith
At 07:03 PM 11/11/99 +0100, Chr. Schulzki-Haddouti wrote: >I am looking for help to identify following three crypto devices, which were >presumably used by NATO and Eastern Countries. You can have a look here: >http://members.aol.com/infowelt/kdevice.htm > >At the moment I am preparing an article

Re: US law makes it a crime to disclose crypto-secrets

1999-12-17 Thread Rick Smith
At 08:59 AM 12/12/1999 -0500, Arnold G. Reinhold wrote: >As I recall, classified documents are required to carry a legend on >each page saying something like "This document contains information >affecting the national defense within the meaning of the espionage >laws, Title 18 793 and 794, the

Re: small authenticator

2000-01-19 Thread Rick Smith
At 04:49 PM 01/18/2000 -0700, [EMAIL PROTECTED] wrote: >I've got something with around 100 bytes of ram and an 8-bit multiply. >Is there an authentication mechanism that can fit in this? What types of attacks are you concerned with? That's the main question. If you have a direct, unsniffable con

Re: The problem with Steganography

2000-01-25 Thread Rick Smith
At 07:20 PM 01/25/2000 -, lcs Mixmaster Remailer wrote: >Steganography is successful if the attacker can't distinguish >message-holding data from ordinary data without the key. Ideally, he >can't guess whether a message is present any better upon inspecting the >cover data than he could with

Re: The problem with Steganography

2000-01-26 Thread Rick Smith
At 04:23 PM 01/25/2000 -0600, I asked: >>With this model there is no problem in making everyone aware of where to >>look for cover traffic with stego data in it. > >Has anyone actually built a steganographic system that has achieved this? Okay, I've seen a half dozen messages saying "it's no pr

Re: The problem with Steganography

2000-01-26 Thread Rick Smith
>Rick Smith wrote: >> It sounds like there are a number of interesting design questions. For >> example, the sender and recipient must obviously share a secret key. At 10:18 PM 01/26/2000 +, Ben Laurie wrote: >Why is that obvious? What's wrong with encoding with the

Re: The problem with Steganography

2000-01-27 Thread Rick Smith
At 12:12 AM 01/27/2000 +, Ben Laurie wrote: >I can't quite see the point of forward stego. I'll leave it to Russ to explain his application if he wants to. > Why not publish something >public key encrypted and publish the private key later? Symmetric cryptography has two advantages in this

Re: DeCSS MPAA New York Opinion

2000-02-04 Thread Rick Smith
At 03:19 PM 02/03/2000 -0800, Phil Karn wrote: >This is one of the sloppiest and misinformed judicial opinions I've >read in a long time. ... I read the hearing transcript and the judge seemed particularly impatient with the defense attorneys. There was the business about the defense attorneys

Re: Copy protection proposed for digital displays

2000-02-23 Thread Rick Smith
At 05:43 PM 02/21/2000 -0800, Eugene Leitl wrote: >HDCP uses a 56-bit key, with individual keys distributed to the >various vendors. A violated key could be tracked down and revoked over >a satellite broadcast network, for example. This design does not consider potential end user reactions. Cons

Re: IP: Gates, Gerstner helped NSA snoop - US Congressman

2000-04-13 Thread Rick Smith
Regarding the following article: >>From The Register, >http://www.theregister.co.uk/000412-20.html >- >Posted 12/04/2000 5:56pm by Graham Lea ... > . The >Register has seen an unofficial transcript of a luncheon meeting on Capitol >Hill of the Internet Caucus Panel Discussion about the ne

Re: IP: Gates, Gerstner helped NSA snoop - US Congressman

2000-04-13 Thread Rick Smith
While writing about OS back-doors, I said: >I'm incredibly skeptical that Microsoft, IBM, or any other vendor >intentionally provides back-doors for the NSA or anyone else. This was too strong, because there is in fact a counterexample that I'd forgotten while composing that e-mail. Jim Gillogy

Re: Automatic passphrase generation

2000-05-02 Thread Rick Smith
At 05:05 PM 04/30/2000 -0700, Steve Reid wrote: >Below is some sample output. The amount of entropy per passphrase should >be more than 89 bits, or almost the same as seven Diceware words. >However, if you generate N passphrases and pick the one that is easiest >to remember then you should subtra

Re: Automatic passphrase generation

2000-05-10 Thread Rick Smith
At 11:42 AM 05/10/2000 +0200, Sergio Tabanelli wrote: >Perhaps this can be out of topic, but recently I was involved in a >discussion on metods to generate strong password starting from easy to >remember word or sentence, there I proposed to use a private key to encrypt >easy to remember words. I

Re: Interesting new covert channel

2000-05-11 Thread Rick Smith
At 08:03 AM 05/11/2000 +0530, Udhay Shankar N wrote: >http://www.firstmonday.dk/issues/issue2_5/rowland/ > >The TCP/IP protocol suite has a number of weaknesses that allow an attacker >to leverage techniques in the form of covert channels to surreptitiously >pass data in otherwise benign packets.

RE: Critics blast Windows 2000's quiet use of DES instead of 3DES

2000-05-19 Thread Rick Smith
At 02:25 PM 05/19/2000 -0400, Arnold G. Reinhold wrote: > . But a cooperative relationship between Microsoft and NSA >(or any vendor and their local signals security agency) can be more >subtle. What if Microsoft agreed not to fix that bug? What if >Microsoft gives NSA early access to sou

Re: NSA back doors in encryption products

2000-05-24 Thread Rick Smith
At 03:48 PM 05/23/2000 -0700, John Gilmore wrote: >Rick Smith wrote: >> If the NSA approaches Microsoft to acquire their support of NSA's >> surveillance mission, then the information will have to be shared >> with a bunch of people inside Microsoft, and they're not

Re: NSA back doors in encryption products

2000-05-24 Thread Rick Smith
>Enzo Michelangeli noted some primality checking software: >> CERTIFIX is an executable for Win95, Win98, NT (hardware Intel >> compatible). And Ben Laurie wrote: >'nuff said! Of course, this increases the size of the conspiracy at Microsoft -- if you have anti-backdoor code, then Microsoft ne

Re: NSA back doors in encryption products

2000-05-24 Thread Rick Smith
Before continuing, let me state my three opinions that this is based on: 1) There is a non-zero risk of backdoors in commercial software, but the perpetrators are as likely (IMHO more likely) to be outside parties and not US agencies like NSA. 2) A persistent backdoor in Windows would have to be

Re: NSA back doors in encryption products

2000-05-24 Thread Rick Smith
At 10:01 PM 05/24/2000 +0100, Ben Laurie wrote: >Amusing though the MS/NSA speculations are, I'm more interested in the >general point: i.e. proving that primes are prime. Having a black box >that claims to do that doesn't really light my fire. The most interesting thing I find about the discuss

Re: NSA back doors in encryption products

2000-05-25 Thread Rick Smith
At 06:42 PM 05/24/2000 -0500, Jim Choate wrote: > >On Wed, 24 May 2000, Eugene Leitl wrote: > >> Rick Smith writes: >> >> If NSA/MS are not doing it, they must be pretty stupid, because I'd do >> it in their place. The prudent assumption is hence: your

Re: NSA back doors in encryption products

2000-05-25 Thread Rick Smith
At 10:10 PM 05/24/2000 -0400, Arnold G. Reinhold wrote: >Maybe this is where our outlooks differ the most. I view a >"localized thing with limited effects" as *more* sophisticated than >some big lump of snuck-in code that searches your hard drive and >sends periodic e-mail to [EMAIL PROTECTED

Re: NSA back doors in encryption products

2000-05-25 Thread Rick Smith
At 09:12 AM 05/25/2000 -0700, David Honig wrote: >Your data still goes through an operating system, etc., so the >real issue is a closed system: encrypt on a PDA which is under your >close personal control and does not download new executables. Let your >untrustworthy networked-PC be merely its

Re: Multi-server Password Authentication

2000-06-12 Thread Rick Smith
At 04:06 PM 06/08/2000 -0400, David Jablon wrote: >A recent announcement by Verisign describes a system for strong network >password authentication, with the added twist of using two or more servers, >such that no individual server keeps any crackable password verifiers. ... I read the marketing

Windows "secure channels"

2000-10-10 Thread Rick Smith at Secure Computing
I've been trying to track down some information for my authentication book, and I'm currently wrestling with the lack of easy to find Microsoft internal specs. So I thought I'd ask the community. I've been writing about what I call "indirect authentication" which refers to the use of an authen

Re: DMCA Final Rule

2000-11-07 Thread Rick Smith at Secure Computing
At 09:20 PM 10/29/00, Peter Wayner wrote: >What is obsolete anyways? The question to me sounds like the one children >would ask: "how old is old?" Well, it's as old as you feel. Are Sony Beta >tapes obsolete? Most will say yes, but I think there are devotees who will >say "No". I know that the

Re: migration paradigm (was: Is PGP broken?)

2000-12-07 Thread Rick Smith at Secure Computing
At 05:04 PM 12/5/00, Ray Dillinger wrote: >If someone wants to enter "sex" as a password, s/he deserves >what s/he gets (although you may put up an "insecure passphrase" >warning box for him/her). The problem is that there's no objective way of knowing when a passphrase becomes 'insecure' since

Re: migration paradigm (was: Is PGP broken?)

2000-12-09 Thread Rick Smith at Secure Computing
At 02:43 PM 12/7/00, Peter Fairbrother wrote: >In WW2 SOE and OSS used original poems which were often pornographic. See >"Between Silk and Cyanide" by Leo Marks for a harrowing account. Yes, a terrific book. However, the book also contains an important lesson regarding human memory. Marks was