Berkeley CSUA MOTD:Entry 21980
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/25 [General] UID:1000 Activity:popular
5/25    

2001/7/28 [Computer/SW/Security] UID:21980 Activity:high
7/27    In Applied Cryptography he basically comes out and says that IDEA
        is pretty much the cypher to use for max. security, but I keep hearing
        about this thing called AES that is "better". Anyone know where
        I can find a comparision of AES to IDEA in terms of the resitance
        to linear and differential crytanalysis.
        \_ from Schneier's mouth, he has no problem with AES/Rjendael; and
           things it should be used widlely.
           \_ Where did you hear this? AES isn't covered in ACv2. If there
              is a v3 I'd buy it just to read about AES.
              \_ See http://www.counterpane.com/crypto-gram-0010.html#8
                                        -- misha.
                 \_ Thanks this is perfect.
        \_ AC is somewhat out of date in this regard; I think IDEA isn't really
           a contender for use in new applications due to the patent and the
           fact that various newer ciphers are at least as good. I don't have
           any particular suggestions as to where to look for information
           beyond citeseer. --Galen
           \_ I had originally planned on (and still probably will) using
              either DES or 3DES (which ever I can get away with linking
              with without needing a export license). I was reading AC and
              found IDEA, which Schneier seemed to recommend. When I heard
              about AES I just wanted more info.
              Since I'm not an expert at this, I just wanted to read about
              how resistant AES is to known crytanalysis as compared to
              other cyphers. Anyway the above link had the info I needed.
2025/05/25 [General] UID:1000 Activity:popular
5/25    

You may also be interested in these entries...
2006/1/4-6 [Computer/Theory, Computer/SW/Security] UID:41226 Activity:nil
1/4     "Mo. Researchers Find Largest Prime Number"
        http://news.yahoo.com/s/ap/20060104/ap_on_sc/largest_prime_number
        Why are people interested in finding large prime numbers?  They already
        know that there are infinte number of primes, so what's the point of
        finding them?
        \_ because they are there.  finding more may help with proving
	...
2004/6/3-4 [Computer/SW/Security] UID:30585 Activity:high
6/3     What kind of encryption scheme is used in the German Enigma Machine?
        Is it symmetrical encryption? Why was it so hard to crack in the 40s?
        \_ I believe it was a poly-alphabetic cypher that changed on each
           letter (therefore, yes it was symmetric).  So, the first
           letter in a mesage would use one cypher, the next would use
           another. The standard machine used 3 wheels, so the opertator
	...
2002/8/20-21 [Computer/SW/Mail, Computer/SW/Security] UID:25623 Activity:very high
8/20    using gpg i want to associate someones public_key with a wildly
        different alias that they also use to mail me encrypted text.
        I skimmed the long man-page but didn't find it.
        \_ you really think the nsa cant read your text in real time?  get
           real.  they can spot the gpg signature and flag your packets to
           make certain a human reads the messages.  sheesh.  dont you know
	...
2002/5/4-6 [Computer/SW/Security, Computer/Theory] UID:24704 Activity:high
5/3     If I want to learn about error correction, compression, and cryto,
        which class would I take?                            crypto? _/
        \_ Info theory at Stanford.  Berkeley does not teach ugrad info theory.
        \_ Information theory.  Read Thomas & Cover.  There is an information
           theory class using that book at Stanford.  Berkeley does not
           teach information theory to undergrads.
	...
2001/12/20 [Computer/Theory, Computer/SW/Unix] UID:23318 Activity:very high
12/19   Why is EULER-PATH not as important as HAMPATH? (seriously, what is the
        main diff between "edges only once" and "nodes only once")
        \_ Euler path is a linear problem- O(V+E).  Hamiltonian circuit is
           NP-Complete, which means that it's at least as hard as
           thousands of other problems.  Produce a polynomial time
           algorithm for Hamilton and you can crack nearly any public-key
	...
2001/9/20 [Computer/SW/WWW/Browsers, Computer/SW/Security] UID:22556 Activity:moderate
9/20    In Netscape for NT, how do I find out whether it's a 56-bit or 128-bit
        version?  Thanks.
        \_ about: doesn't work for you?
           \_ It says" This version supports U.S.  security with RSA Public Key
              Cryptography, MD2, MD5, RC2-CBC, RC4, DES-CBC, DES-EDE3-CBC."
              Does it mean 56-bit or 128-bit?
	...
2001/6/19 [Computer/SW/Security] UID:21577 Activity:high
6/19    Here is another question for all you knowledgable crypto people.
        How bad is the ability of a PC to generate random numbers for
        cryptography?  Is this at all a limiting factor in PC based
        encryption?  If someone were to build a little box that made
        random numbers based on a physical process that was provably
        uncorrelated, would that interest people?
	...
2001/6/19 [Computer/SW/Security, Computer/Theory] UID:21573 Activity:high
6/18    I have a question about diffie-hellman. After going through the initial
        key exchange and generating the session key k', how do you use this key
        with 3des or blowfish? Do you just trucate the key to the appropriate
        length (doesn't seem right) or is there some other method?  tia.
        \_ Probably feed the key into a one way hash function (i.e. MD5) that
           outputs the appropriate number of bits.
	...
2001/5/29 [Computer/Companies/Google] UID:21376 Activity:kinda low
5/29    I'm looking for a list of 512bit or larger primes I can use
        for a diffie-hellman implementation I'm working on. Google
        didn't produce many workable matches. Anyone know where I
        might be able to find a list?
        \_ How many do you need?
           \_ A dozen or so should be more than enough. My understanding
	...
Cache (69 bytes)
www.counterpane.com/crypto-gram-0010.html#8
On most browsers, you will be redirected automatically; References 1.