I was in a post-apocalyptic Texas. My mission was to broker piece between my village and a gang of nomadic gay vampires. It wasn’t just my blood they wanted to suck. My main concern was that I didn’t want to become Vampire+. I decided I preferred them to the cannibal UFO worshipers. Secret messages were being exchanged by using steganography to hide them in photographs of puppies. Details and algorithms were found in Bruce Schneier’s book “Look!
Lotus Domino 7 has an unfortunate bug which means that you can’t cross-certify with another organization via phone or e-mail, by using the Domino Administrator, choosing Cross Certify Key… and entering their key ID. The bug is documented in the readme.pdf,
and is still unfixed as of 7.0.2. It results in server errors saying “The subject’s public key found in the cross certificate does not match the one found in the certificate table.”
[Update 2006-05-17: I’m pleased to say that I heard today they’ve managed to squeeze a fix for the problem into 7.0.2. This is not an official statement of support from IBM, etc etc.]
This is a problem in situations where you want to cross-certify your server with someone else’s, but for whatever reasons they can’t or won’t give you access to CERT.ID, and can’t engage the cooperation of the owners of their CERT.ID.
I’m impressed that The Daily Show got someone who actually knows about cryptography to help with their script tonight. Most shows would string together a bunch of random Star Trek jargon words… Extract from Ed Helms talking to John Stewart about digital voting systems: Ed: Fortunately today’s e-voting systems support a robust cryptography architecture, using DES keys in CBC mode with a random initialization vector. Now, I know what you’re thinking… “Ed, the CBC encrypt uses a zero seed number so keys could be recovered by parallel processors running a virtual network protocol in a trivially short timeframe.
Well, this is the most interesting thing I’ve heard about in a while: someone’s come up with a provably unbreakable encryption scheme that’s actually practical to implement. There’s an article in the New York Times about it; basically, the scheme goes as follows: Someone sets up a satellite to generate a stream of truly random numbers, synchronized to some appropriate time code. The sender and recipient exchange a secret using an existing public-key encryption scheme, or using some other secure channel.