Profile

unixronin: Galen the technomage, from Babylon 5: Crusade (Default)
Unixronin

December 2012

S M T W T F S
      1
2345678
9101112131415
16171819202122
23242526272829
3031     

Most Popular Tags

Expand Cut Tags

No cut tags
Sunday, November 7th, 2004 01:43 pm

OK, memeage.  First, the book meme:

Grab the nearest book.
Open the book to page 23.
Find the fifth sentence.
Post the text of the sentence in your journal.

The last sentence on page 22 extends on to page 23.  I'm therefore going to interpret this as "the fifth full sentence beginning on page 23", and that is:

"We can examine the protocol without getting bogged down in the implementation details."

(Bruce Schneier, Appled Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Wiley Press)


Next, the photo meme:

  1. Stop talking about politics for a moment or two.
  2. Post a reasonably-sized picture in your LJ, NOT under a cut tag, of something pleasant, such as an adorable kitten, or a fluffy white cloud, or a bottle of booze.  Something that has NOTHING TO DO WITH POLITICS.

OK, this ain't political ... it's PILOTICAL.  :-)

(My politics are Libertarian; my pilotics are "Mach 3 with your hair on fire."   :-)   Click this version to get the full 1.4-megabyte 2100x1500 version; it makes great desktop wallpaper.)

Sunday, November 7th, 2004 11:04 am (UTC)
Wow. I had a smaller version of this...

My pilotics are "2000+nm in an airplane you built yourself (http://www.melmoth2.com/)...."
Sunday, November 7th, 2004 04:34 pm (UTC)
I'm just wondering why Applied Crypto was the closest book to you.
I keep meaning to buy a copy of it for myself, instead of repeatedly borrowing my co-workers copy.
Sunday, November 7th, 2004 04:53 pm (UTC)
I've been planning to add client-to-client encryption to my ICB client, ICBM. (So far I'm finding that the most difficult part of the problem to solve is the infrastructure of how to distribute keys, and how to ascertain that you're trying to talk to a remote client using the correct key that actually belongs to that client (i.e, how to rule out man-in-the-middle attacks, since it should be able to function securely on an untrusted server).
Sunday, November 7th, 2004 05:38 pm (UTC)
That is a fabulous picture!