News Bits

Four items from the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University:

From that page:

Extraordinary changes in the way we do business and lead our lives in the ever-connected world of the future will create tremendous security challenges. These challenges will be shaped by many of today's emerging trends: the rapid acceleration of network speed, connectivity and the overall number of devices; the removal of the human element from many everyday transactions; and easier and cheaper collection of public and private information. More than ever before, we will demand security solutions that enable businesses to thrive and private information to be protected. Accenture has just released the Security Call to Action and executive summary, from the 15 security experts who participated in the CERIAS Security Vision Roundtable. This two-day event, jointly sponsored by Accenture and the Purdue University CERIAS (Center for Education and Research in Information Assurance and Security), brought together both industry pioneers as well as information security leaders experts at some of the largest and most influential companies in the world. The report includes a Call to Action and a list of the key trends affecting security over the next decade. The bottom-line is that doing security right requires the greater community of business leaders, technologists, educators and political leaders to look seriously at this Call to Action and to commit resources and energy to help lead us all to a more secure world. Accenture is the new name for Andersen Consulting as of January 1, 2001.

Correspondence from Janos A. Csirik:

In contrast with GSM, the 3GPP organisation (responsible for 3G wireless phone standards) is making all of its documents public.  However, the way in which these documents are made public is unlikely to result in immediate gratification for those who would just like to go in and look at the crypto algorithms.  For that reason, I have undertaken to construct a Web page to help cryptographers learn about and study the crypto algorithms for 3G wireless phones.  I believe that the algorithms will receive much more and better scrutiny if it is easy to find them (and other 3G documents that are relevant to them). This page can be found at

Thank you for your attention!

Janos A. Csirik


News Bits contains correspondence, interesting links, non-commercial announcements and other snippets of information the editor thought that Cipher readers might find interesting.  And, like a UCITA protected product, by reading the above page you have already agreed to not hold the editor accountable for the correctness of its contents.