No subject


Wed Nov 1 13:32:02 EST 2006


Waltham. Follow signs for Rt. 117 (left at the second light). When you get
to 117 turn left (West). You will cross back over Rt. 128.
Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second
left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from
Rt. 128 (I95). The office building is at the bottom of Jones Rd.
The room is MPR C. 

Jim Weiler
Staples North American Delivery
Application Security Architect
508 2533884
 

------_=_NextPart_001_01C5F6B2.50F83652
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=US-ASCII">
<TITLE>Message</TITLE>

<META content="MSHTML 6.00.2800.1522" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT face=Arial size=2><SPAN class=340014019-01122005>Topic: Enigma 
variations: Key Management controlled.</SPAN></FONT></DIV>
<DIV><FONT><SPAN class=340014019-01122005>
<DIV><SPAN class=714114515-30112005></SPAN><SPAN class=714114515-30112005><FONT 
face=Arial><FONT size=2><SPAN class=340014019-01122005>The </SPAN>Allies cracked 
the Germany high-command's Enigma ciphers in the 2nd world war principally due 
to weaknesses in the German's key management - not because of their weak crypto 
algorithms.</FONT></FONT></SPAN></DIV>
<DIV><FONT face=Arial size=2><SPAN 
class=714114515-30112005></SPAN></FONT>&nbsp;</DIV>
<DIV><SPAN class=714114515-30112005><FONT face=Arial><FONT size=2>With the 
growing application of cryptography to protect organisation's digital assets, 
k<SPAN class=714114515-30112005>ey management&nbsp;again becomes of paramount 
consideration. We examine some of the major&nbsp;challenges&nbsp;and 
approaches.</SPAN></FONT></FONT></SPAN></DIV></SPAN></FONT></DIV>
<DIV><FONT face=Arial size=2><SPAN 
class=340014019-01122005></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2><SPAN class=340014019-01122005>Speaker: <SPAN 
class=714114515-30112005>Paul Galwas, Product Manager, 
nCipher</SPAN></SPAN></FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><SPAN class=340014019-01122005><FONT face=Arial size=2>Pizza will be 
supplied by nCipher</FONT></SPAN></DIV>
<DIV><SPAN class=340014019-01122005><FONT face=Arial 
size=2>----------------------------------------------------------------------------------------------------------</FONT></SPAN></DIV>
<DIV><SPAN class=340014019-01122005><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=340014019-01122005><FONT face=Arial size=2>Folks, this topic is 
one of those things where&nbsp; as a developer, lead tech designer or 
project/software architect you often feel that having figured out when, where 
and how your data encryption is done, means you've taken care of the encryption 
part of your project. Then as you get into actually deploying it, or you get hit 
with regulations or PCI standards, you realize key management is the hard part 
and the part that really effects your security, data design, database 
schema&nbsp;and program architecture, much more than selecting the crypto 
algorithm and key size, initialization vectors etc. This applies whether you're 
doing a web app, web service, internal app, handheld app 
etc.</FONT></SPAN></DIV>
<DIV><SPAN class=340014019-01122005><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=340014019-01122005><FONT face=Arial size=2>Jim 
Weiler</FONT></SPAN></DIV>
<DIV><SPAN class=340014019-01122005><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=340014019-01122005><FONT face=Arial 
size=2>----------------------------------------------------------------------------------------------------------</FONT></SPAN></DIV>
<DIV><SPAN class=340014019-01122005>
<P>To find out more about the Boston chapter, please send an email to <A 
href="mailto:Jim.Weiler at owasp.org">Jim Weiler</A> or just join the <A 
href="http://lists.sourceforge.net/lists/listinfo/owasp-boston">OWASP Boston 
mailing list</A>.<BR><BR>We meet the FIRST WEDNESDAY of EVERY MONTH, 6:30 to 9 
pm.<BR><BR>Everyone is welcome to come to any meeting, there is no signup or 
joining criteria, just come if it sounds interesting. Feel free to sign up to 
the <A href="http://lists.sourceforge.net/lists/listinfo/owasp-boston">OWASP 
Boston mailing list</A>. This list is very low volume (2 - 3 emails/month); it 
is used to remind people about each monthly meeting, inform about local 
application security events and special chapter offers.<BR><BR>Information and 
an RSS feed for meeting updates about this and other Boston area user groups can 
be found at <A href="http://www.bostonusergroups.net/DNN/">Boston User 
Groups</A> </P>
<H2>Location </H2>
<P>The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month, 6:30 pm at 
the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., 
Sixth Floor Waltham, MA. <BR><BR>From Rt. 128 North take exit 26 toward Waltham, 
East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the 
rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the 
second light). When you get to 117 turn left (West). You will cross back over 
Rt. 128.<BR>Jones Rd. (look for the Waltham Weston Corporate Center sign) is the 
second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles 
from Rt. 128 (I95). The office building is at the bottom of Jones Rd.<BR>The 
room is MPR C. </P></SPAN></DIV>
<DIV align=left><FONT face=Arial size=2>Jim Weiler</FONT></DIV>
<DIV align=left><FONT face=Arial><FONT size=2>Staples North American 
Delivery</FONT></FONT></DIV>
<DIV align=left><FONT face=Arial size=2>Application Security 
Architect</FONT></DIV>
<DIV align=left><FONT face=Arial size=2>508 2533884</FONT></DIV>
<DIV>&nbsp;</DIV></BODY></HTML>

------_=_NextPart_001_01C5F6B2.50F83652--




More information about the Owasp-boston mailing list