Create an Account
username: password:
 
  MemeStreams Logo

What questions are you asking yourself?

search

Jeremy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Jeremy's topics
Arts
  Literature
   Classical
   Fiction
   Horror
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
   Movie Genres
    Action/Adventure
    Cult Films
    Documentary
    Drama
    Horror
    Independent Films
    Film Noir
    Sci-Fi/Fantasy Films
    War
  Music
   Music Styles
    Classical
    Electronic Music
    Rap & Hip Hop
    IDM
    Jazz
    World Music
  TV
   TV Documentary
   TV Drama
   SciFi TV
Business
  Finance & Accounting
  Industries
   Tech Industry
   Telecom Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
   Console Video Games
Health and Wellness
  Medicine
Home and Garden
  Cooking
  Entertaining
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   California
    SF Bay Area
   Events in Washington D.C.
   News for Washington D.C.
   Georgia
    Atlanta
     Atlanta Events
Science
  Biology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Technology
  Biotechnology
  Computers
   Computer Security
    (Cryptography)
   PC Hardware
   Human Computer Interaction
   Computer Networking
   Macintosh
   Software Development
    Open Source Development
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Cryptography

Counterpane: Crypto-Gram: December 15, 2002
Topic: Cryptography 6:35 pm EST, Dec 15, 2002

] Steganography, and whether or not terrorists are using it:
] http://elonka.com/steganography/

Bruce Schneier has included the URL for Elonka's talk in the latest issue of the Crypto-Gram newsletter.

PhreakNIC hits the big time! Maybe you can get Schneier to show up next year and give a keynote speech.

Also, this URL should be updated to include a link to MemeStreams.

Counterpane: Crypto-Gram: December 15, 2002


Towards a deterministic polynomial-time Primality Test
Topic: Cryptography 5:53 am EDT, Aug 13, 2002

We examine a primality testing algorithm and show that this test is stronger than some of the most popular tests. From this, we show the correctness of the algorithm based on a widely believed conjecture. We also show that any n which is accepted by the algorithm must be an odd square-free number. Thus, it is arguably the simplest and yet the strongest test for primality.

The full report is available in PostScript.

Towards a deterministic polynomial-time Primality Test


New Method Said to Solve Key Problem in Math
Topic: Cryptography 5:49 am EDT, Aug 13, 2002

Three Indian computer scientists have solved a longstanding mathematics problem by devising a way for a computer to tell quickly and definitively whether a number is prime.

MIT professor Shafi Goldwasser: "This was one of the big unsolved problems in theoretical computer science and computational number theory. It's the best result I've heard in over 10 years."

Bell Labs' Carl Pomerance: "This algorithm is beautiful."

New Method Said to Solve Key Problem in Math


Design and Implementation of the Idemix Anonymous Credential System
Topic: Cryptography 5:31 pm EDT, Jun 29, 2002

Anonymous credential systems allow anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a powerful technique for protecting users' privacy when conducting Internet transactions.

In this paper, we describe the design and implementation of an anonymous credential system based on the protocols developed by earlier work. We demonstrate the use of a prototype in Java and discuss some deployment issues.

Design and Implementation of the Idemix Anonymous Credential System


When Navajos Fought Japanese for Ne-He-Mah
Topic: Cryptography 8:57 am EDT, Jun 15, 2002

It is the most romantic story in American cryptology. To keep the Japanese from getting American secrets in World War II, Navajos -- among the original Americans -- spoke over the radio in their native tongue.

In a sidebar to the movie review for "Windtalkers", David Kahn, author of the crypto classic _The Codebreakers_, retells the true story of Marine Corps codetalkers in World War II.

When Navajos Fought Japanese for Ne-He-Mah


Cryptographic Abundance | MIT Technology Review, Jan/Feb 2002
Topic: Cryptography 11:00 pm EST, Jan 17, 2002

"Cryptography could give us data privacy today. Only no one's asking for it."

Xerox PARC scientist Tom Berson laments the current state of the research community in cryptography. He seems to oversimplify things a bit, though. I can't wait for Bruce Schneier to dig into this. The article wraps up with gems like this:

"When enough of us understand how easy it is to make truly secure systems, and refuse to buy anything that offers us less, we will give companies the economic incentive they currently lack." (emphasis added)

Cryptographic Abundance | MIT Technology Review, Jan/Feb 2002


CryptoHeaven Secure Free Email, Online Storage, File Sharing
Topic: Cryptography 10:05 pm EST, Jan  1, 2002

CryptoHeaven offers online, Internet accessible secure services: Secure Free and Premium Email; Secure File Storage, File Sharing and File Distribution; Secure Instant Messaging and Chatting

CryptoHeaven ... accelerates wide spread use of ... cryptography ... without restrictions. ... CryptoHeaven is a user-friendly, no-compromise information-heaven crypto system. ... Information is stored in encrypted form on the server as generated by the client, and only the sender and the recipient possess the keys to gain access to the information. ... We use ... AES ... Rijndael cipher, ... public-key cryptography, ... and SHA-256 ...

CryptoHeaven Secure Free Email, Online Storage, File Sharing


Roger Clarke's 'Re-Invention of PKI'
Topic: Cryptography 6:06 am EST, Dec 17, 2001

Abstract: "Building on a richer conception of authentication than has been used to date, a statement of requirements is expressed for public key infrastructure (PKI) to support e-business. Inadequacies inherent in conventional PKI are underlined, providing important reasons for its continued low take-up rates. Alternative approaches to electronic authentication are evaluated against the requirements."

Contents:
* 1. Introduction
* 2. The New Model of Authentication
* 3. What Public Key Technologies Do, and Don't Do
* 4. Requirements of an Effective PKI
* 5. Conventional PKI
* 6. Alternative Approaches to PKI
* 7. Conclusions
* Appendix 1: Elements of a PKI to Support Digital Signatures
* References

Roger Clarke's 'Re-Invention of PKI'


Tracing technology could catch digital pirates
Topic: Cryptography 11:06 pm EST, Dec 11, 2001

"A new watermarking technology could help track down people who make copies of copyrighted digital material. The technique works by concealing information about the identity of the offender inside the copy, according to the company developing the technique."

The upshot: UK company Amino Communications has commercialized a watermarking system with reasonably effective traitor tracing. But Microsoft's Fabien Petitolas (author of a good Artech House book on stego/watermarking) warns, "So far nobody has come up with schemes that are really robust to attacks."

Tracing technology could catch digital pirates


Threshold Cryptosystems Based on Factoring
Topic: Cryptography 10:10 pm EST, Nov  8, 2001

"We consider distributed (threshold) cryptosystems over a composite modulus N in which the factors of N are shared among the participants as the secret key. This is a new idea for threshold cryptosystems based on a composite (i.e., different from the typical treatment of the much-studied RSA-based threshold systems where a "decryption exponent" is shared among the participants). The paradigm enables solutions to open problems in threshold cryptography and it also yields substantial efficiency improvements when generation of N is done in a distributed manner (i.e., without a trusted dealer)."

Threshold Cryptosystems Based on Factoring


(Last) Newer << 1 - 2 - 3 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0