Re: DeCSS and imminent harm ...

2000-08-30 Thread Sandy Harris
> Ernest Hua wrote: > > Can someone point me to the argument where > either Judge Kaplan or some motion picture > industry person claims publication of DeCSS > code results in imminent or irreparable > harm? Most or all the arguments on both sides are archived at: http://www.eff.org/cafe/ The

Re: DeCSS and imminent harm ...

2000-08-31 Thread Sandy Harris
Kevin Blanchard wrote: > > In fact I think spreading the DeCSS is a GREAT idea. If they are trying to > stop people from posting it, I think an email circulation is also in order. > > I do not believe it should be down as a rebellion but history has shown the > technology advances happen more oft

Re: Wassenaar question

2001-01-31 Thread Sandy Harris
Back in mid-1999, I sent this to the list: > The Canadian Dep't of Foreign Affairs & International Trade (DFAIT) has an export law > page at: > > http://www.dfait-maeci.gc.ca/~eicb/notices/ser113-e.htm > > It includes this text: > > | PROPOSED EXPORT CONTROL LIST CHANGES: > | > | 12. The Was

Re: [aaa-list] Tommy Flowers, Engineer who cracked German communications, dead, at, 92

1998-11-10 Thread Sandy Harris
tchley Park became the center of Allied code-breaking. Enigma was a major target, though they also worked on other ciphers. They built two generations of cracking engine specifically for Enigma. Flowers was the main designer of Collosus, the second one. -- Sandy Harris[EMA

[Fwd: Update on PGP-export restrictions from Denmark]

1998-12-15 Thread Sandy Harris
Forwarded from another list Original Message Subject: Update on PGP-export restrictions from Denmark Date: Tue, 15 Dec 1998 15:41:17 +0100 From: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> Reply-To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Hi This is an update

Re: quantum codebreaker

1999-05-24 Thread Sandy Harris
Enzo Michelangeli wrote: > Sure, I did not intend to belittle the theoretic significance of those > papers, which are surely very interesting. I just meant that: > > 1. Converting a generic codebreaking problem into an NP-complete one with a > transformation of polynomial complexity, while prob

Re: Bridge

1999-06-23 Thread Sandy Harris
Russell Nelson wrote: > Plus, the source of the entropy and algorithm used to create the > bridge hands merely need to be auditable. As long as the hands are > based on some public source of entropy (e.g. the day's stock market) > plus a letter publicly chosen by each of the participants (that's

[long] Yet another random number generator

1999-07-11 Thread Sandy Harris
I'm thinking about getting enough random numbers for a server that does a lot of crypto, e.g. an IPSEC gateway, a web server doing SSL, perhaps a PKI server. On a heavily loaded server running FreeS/WAN IPSEC http://www.xs4all.nl/~freeswan you might have something of the order of an IPSEC conne

Re: depleting the random number generator

1999-07-18 Thread Sandy Harris
bram wrote: > > > Most of the fancy reseedable PRNG schemes people have come up with are > > > based on using secure hashes. > > > > They are sure validated, but are they the best we can do? MD5, the > > nonplusultra, really? > > The main reason for secure hashes being the primary primitive us

Re: depleting the random number generator

1999-07-19 Thread Sandy Harris
Enzo Michelangeli wrote: > Sorry folks, but I can't understand where the problem is supposed to be. The > entropy of a pool is a measure of the information about its internal state > that we don't know: which is why in thermodynamics the same name is given to > the logarithm of the number of (in

Re: [long] Yet another random number generator

1999-07-29 Thread Sandy Harris
John Kelsey wrote: Quoting me: > >Proposal: > > > >Could we do a large part of this with a fairly simple chip, > >all digital, without diodes etc.? A system bus has typically > >at least 32 data and 32 address lines plus a bunch of > >control signals. Perhaps 80 bits that can be sampled at > >pe

Summary re: /dev/random

1999-08-01 Thread Sandy Harris
This is an attempt to summarize a wide-ranging discussion and see if we have a consensus. There's been much discussion on at least three lists: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] of design of random number generators in general and Linux /dev/random in particular.

Proposal (was Summary re: /dev/random)

1999-08-01 Thread Sandy Harris
In an ealier message I wrote: > Conclusions I've reached that I hope there's agreement on: > > More analysis is needed, especially in the area of how > to estimate input entropy. > [SNIP] > > Yarrow's two-stage design, where the output from > hashing the pool seeds a pseudo-random number > gen

Wassenaar question

1999-08-21 Thread Sandy Harris
The Canadian Dep't of Foreign Affairs & International Trade (DFAIT) has an export law page at: http://www.dfait-maeci.gc.ca/~eicb/notices/ser113-e.htm It includes this text: | PROPOSED EXPORT CONTROL LIST CHANGES: | | 12. The Wassenaar ... States agreed to ... a Cryptography Note | app

Re: more re Encryption Technology Limits Eased

1999-09-17 Thread Sandy Harris
"Steven M. Bellovin" wrote: > > In message <[EMAIL PROTECTED]>, Declan McCullagh wr > ites: > > What I found most interesting was what Attorney General Reno said about the > > government's cryptanalysis abilities. When asked if she can break strong, > > >64 bit equivalent crypto, she said, "We ha

Re: 56 Bits?????

1999-11-10 Thread Sandy Harris
This was sent to several individuals and five mailing lists. Is that necessary? I've cut reply down to two lists. Marc Horowitz wrote: > > For most attackers and most secrets, more traditional techniques like > blackmail and torture are likely to be cheaper and easier than the > attacks below.

Re: PRNG State [was: KeyTool internal state]

2000-04-03 Thread Sandy Harris
Andrew Cooke wrote: > I expect a PRNG with an internal state of n bits to produce output > that is predictable given n consecutive bits of output. Is that > correct? I don't think it is so necessarily, but two weaker constraints are. If the internal state is n bits, then a brute force attack t

Re: from Interesting People: Record encryption puzzle cracked -- finally

2000-04-17 Thread Sandy Harris
"Perry E. Metzger" wrote: > > Anyone know anything about this? It was a Certicom elliptic curve challenge. For details: http://www.certicom.com/ > -- > Perry Metzger [EMAIL PROTECTED] > -- > "Ask not what your country can force other people to do for you..." > --- Start of forwar

Re: Perfect Forward Security def wanted

2000-05-05 Thread Sandy Harris
The definition in the glossary for the FreeS/WAN Linux IPSEC project is: A property of systems such as Diffie-Hellman key exchange which use a long-term key (the shared secret in IKE) and generate short-term keys as required. If an attacker who acquires the long-term key provably can neithe

Re: NYT reporter looking for advice re: encryption products

2000-05-11 Thread Sandy Harris
Lisa Guernsey wrote: > > Hello, > > I'm working on a story that mentions several encryption systems, and I've > heard that many companies often claim they have good products when in fact > they have the equivalent of snake oil. "Snake oil" is so common that there's a FAQ on recognising it: htt

Re: Critics blast Windows 2000's quiet use of DES instead of 3DES

2000-05-19 Thread Sandy Harris
Paul Kierstead wrote: > > > Frankly, I can't understand why the IPsec protocol still > > allows DES. It > > should require strong encryption. Having DES in a product > > these days makes > > about as much sense as mandating the usage of ROT13. > > OK, so I want to prevent some regular, every-day