Cryptography-Digest Digest #656, Volume #12      Mon, 11 Sep 00 15:13:01 EDT

Contents:
  ECC 2000 (Alfred John Menezes)
  Re: Getting Started, advice needed (FAQs , yes I read them) (Andy C)
  Re: (Jury Selection) Re: Carnivore article in October CACM _Inside_Risks (Yiorgos 
Adamopoulos)
  Re: Getting Started, advice needed (FAQs , yes I read them) (Andy C)
  Re: Getting Started, advice needed (FAQs , yes I read them) (Andy C)
  Re: Capability of memorizing passwords (Mok-Kong Shen)
  Re: Camellia, a competitor of AES ? (Mok-Kong Shen)
  Re: ExCSS Source Code ("David C. Barber")
  Re: ExCSS Source Code ("David C. Barber")

----------------------------------------------------------------------------

From: [EMAIL PROTECTED] (Alfred John Menezes)
Subject: ECC 2000
Date: 11 Sep 2000 17:18:28 GMT


==============================================================================

THE 4TH WORKSHOP ON ELLIPTIC CURVE CRYPTOGRAPHY (ECC 2000)

University of Essen, Essen, Germany

October 4, 5 & 6 2000


ECC 2000 is the fourth in a series of annual workshops dedicated to the 
study of elliptic curve cryptography and related areas. The main themes 
of ECC 2000 will be:
  - The discrete logarithm and elliptic curve discrete logarithm problems.
  - Provably secure discrete log-based cryptographic protocols for 
    encryption, signatures and key agreement.
  - Efficient software and hardware implementation of elliptic curve 
    cryptosystems.
  - Deployment of elliptic curve cryptography.

It is hoped that the meeting will encourage and stimulate further 
research on the security and implementation of elliptic curve 
cryptosystems and related areas, and encourage collaboration between 
mathematicians, computer scientists and engineers in the academic,
industry and government sectors.

There will be 17 invited lectures (and no contributed talks), with the 
remaining time used for informal discussions. There will be both survey 
lectures as well as lectures on latest research developments. 

SPONSORS:
     Certicom Corp.
     Communications and Information Technology Ontario
     CV Cryptovision  
     Forschungsverbund Datensicherheit (Minist. SWWF, NRW)
     Infineon
     MasterCard International
     Metris           
     Mondex International Limited
     Siemens AG       
     University GH Essen
     University of Waterloo

ORGANIZERS:
     Gerhard Frey     (University of Essen)
     Steven Galbraith (University of Essen)
     Alfred Menezes   (University of Waterloo)
     Scott Vanstone   (University of Waterloo)

SPEAKERS:
     Jan Camenisch    (IBM Zurich, Switzerland)
     Ronald Cramer    (BRICS, Denmark)
     Claus Diem       (University of Essen, Germany)
     Pierrick Gaudry  (LIX, France)
     Erwin Hess       (Siemens, Germany)
     Ansgar Heuser    (BSI, Germany)
     Neal Koblitz     (University of Washington, USA)
     Robert Lambert   (Certicom Corp., Canada)
     Arjen Lenstra    (Citibank, USA)
     Peter Montgomery (Microsoft Research, USA)
     Christof Paar    (Worcester Polytechnic Institute, USA)
     Phil Rogaway     (University of California at Davis, USA)
     Takakazu Satoh   (Saitama University, Japan)
     Ernst Schulte-Geers (BSI, Germany)
     Igor Semaev      (Moscow, Russia)
     Nigel Smart      (University of Bristol, UK)
     Scott Vanstone   (University of Waterloo, Canada)

CONFERENCE PROGRAMME

There will be seventeen invited lectures. All lectures will be held on 
the campus of the University of Essen. The titles of the lectures are: 
  Camenisch     Group Signature and Identity Escrow Schemes
  Cramer        Secure Homomorphic Multi-Party Computation: Efficient
                Constructions from Homomorphic Threshold Encryption and 
                Applications to Secure Distributed Linear Algebra.
  Diem          Galois Theory and the DL-Problem
  Gaudry        Hyperelliptic Curve Discrete Logarithms
  Hess          Aspects of Public-Key Cryptosystems in Practice
  Heuser        Public Key Cryptography from the Point of View of a 
                National InfoSec Agency
  Koblitz       Miracles of the Height Function - A Golden Shield 
                Protecting ECC
  Lambert       Block Architectures for Cryptographic Hardware
  Lenstra       The XTR Public-Key System
  Montgomery    Parallel Block Lanczos
  Paar          Reconfigurable Hardware in Modern Cryptography
  Rogaway       Stopping Dictionary Attacks
  Satoh         Canonical Lifting of Elliptic Curves and p-Adic Point 
                Counting -- Theoretical Background
  Schulte-Geers Collision Search in a Random Mapping: Some Asymptotic 
                Results
  Semaev        Discrete Logarithms in Prime Finite Fields for Special 
                Moduli
  Smart         Recent Work on Weil Descent
  Vanstone      The Past Fifteen Years of Public-Key Cryptography

=================================================================
              Wednesday           Thursday            Friday
=================================================================
8:00-9:30     Registration

9:30-10:20    Heuser              Vanstone            Hess

10:50-11:40   Lenstra             Camenisch           Rogaway

12:00-12:50   Semaev              Cramer              Satoh

                             L    U    N    C    H

14:00-14:50   Gaudry              Lambert             Koblitz

15:20-16:10   Smart               Paar

16:30-17:20   Diem                Montgomerey

17:30-18:20                       Schulte-Geers

              RECEPTION

20:00                             BANQUET
==================================================================

REGISTRATION

There will be a registration fee this year of DM 200 or $ 100 US
(DM 100 or $ 50 US for students). PLEASE REGISTER AS SOON AS POSSIBLE 
AS SPACE IS LIMITED FOR THIS WORKSHOP; REGISTRATION IS ON A 
FIRST-COME FIRST-SERVE BASIS. To register, complete, in full, the
attached REGISTRATION FORM and return it

by e-mail to:   [EMAIL PROTECTED]

by mail to:     Ms. Karin Rufaut
                Institute for Experimental Mathematics
                Ellernstrasse 29
                45326 Essen
                Germany
                
                Phone: +49/201/183-7656(7649)

========================cut from here=================================
ECC 2000 CONFERENCE              REGISTRATION FORM

Fullname:
_________________________________________________________

Affiliation:
_________________________________________________________

Address:
_________________________________________________________

_________________________________________________________

_________________________________________________________

_________________________________________________________

_________________________________________________________

E-Mail Address:
_________________________________________________________

Telephone #:
_________________________________________________________

Mark your choice:

Registration Fee:                        DM 200   / $ 100 US

Student Registration Fee:                DM 100   / $  50 US

(Registration Fee Includes Banquet)
      Attending Banquet:  Yes / No       Vegetarian:  Yes / No

Extra Guest Banquet Fee:                 DM  50   / $  25 US
       Guest Vegetarian:  Yes / No

TOTAL REGISTRATION FEE:                  DM____   / $____ US



PAYMENT MUST BE MADE IN CASH ON ARRIVAL AT THE RECEPTION DESK.


Accommodation (please mark your choice)

( ) I would like to reserve a single-        DM 115 per night 
    room for ___ nights, from ___
    to ___ October, 2000 (please fill
    in the dates of arrival and
    departure).

( ) I would like to reserve a single-        DM 130 per night
    room with a large bed ("grand lit")
    for ___ nights, from ___ to ___
    October, 2000.

( ) I would like to reserve a double-        DM  75 per person / per night
    room for ___ nights, from ___ to
    ___ October, 2000 and I would like
    to share it with _________________ .


( ) I would like to reserve a bed in         DM  75 per person / per night
    a double-room from ____ to ___
    October, 2000 and I'm ready to share
    it with another participant of the
    conference.

( ) I don't need a hotel room.


The hotel bill should be paid directly at the hotel reception.


=========================cut from here===============================

TRAVEL

Essen is situated approximately 30 km from Duesseldorf International
Airport and about 250 km from Frankfurt Airport.

Participants should plan to arrive on October 3 to be able to attend
the lectures on Wednesday morning.


Duesseldorf Airport to Essen Hauptbahnhof (main station):
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++

 From any of the terminals take the free airport bus to
the train station (Flughafen bahnhof). From there you can
buy a "zone C" ticket for DM13 and you must remember to
validate (time stamp) the ticket before boarding the train.
There are plenty of trains from this station to Essen HBF.
The Zone C ticket is valid on S-Bahn, RE and IR trains.
If you take an Intercity train then you will have to pay
a higher fare but this can be bought from the conductor on
the train. Journey time from Duesseldorf airport to Essen
is 30-40 minutes.

Note that there is an airport in Monchengladbach which is also
called "Duesseldorf airport" and which is served by a few smaller
airlines within Europe.  One can also get to Essen from this airport
by using the S-bahn, but the journey time is longer (about 2 hours).

Frankfurt Airport to Essen Hauptbahnhof (main station):
+++++++++++++++++++++++++++++++++++++++++++++++++++++++

There is a train (InterCity) which goes directly from Frankfurt/Main
Airport to "Essen Hauptbahnhof". There is one train an hour. the
journey takes approximately 3 hours and costs around DM 100.
An exact timetable for these (and other) trains can be found
at http://bahn.hafas.de/bin/detect.exe/bin/query.exe/en
Tickets may be purchased at the station or on the train.
Another possibility is to take suburban train (S-Bahn) S8 to Mainz 
and then change to an Essen train.  For "InterCity" trains it is
necessary to pay a DM 7 supplement.

Essen Hauptbahnhof (main station) to the University of Essen:
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

To walk from Essen Hauptbahnhof to the University of Essen takes
around 20-25 minutes.  It is also possible to take the
underground train U11 direction "Universitaet Essen"
and get off at the "Universitaet Essen" stop.  On the underground
it is necessary to buy a ticket in advance and validate (time stamp)
it either before entering the platform or immediately upon boarding
the train.

Maps of the region, city and university can be found at:
   http://www.uni-essen.de/plan/

ACCOMMODATION

There is a limited block of rooms set aside on a first-come first-serve 
basis at three mid-range hotels in Essen: "Korn's Hotel", "Europa"
and "Lindenhof".  All three hotels are close to both the Essen main station
and the University of Essen and can easily be reached by public transport.
Breakfast is included.  We ask you to make your hotel reservations with us.

In all three hotels, the price is DM 115 for a single room and DM 150 for
a double room. "Korn's Hotel" also has single rooms with a large
bed ("grand lit"), the price for these rooms is DM 130 per night. If you
prefer such a room, please indicate on the registration form. If all the
single rooms for DM 115 are booked out, we will automatically reserve
a single room with "grand lit" for DM 130 for you.

The addresses of the hotels and their exact location will be emailed to
registrants next week.
===========================================================================


------------------------------

Subject: Re: Getting Started, advice needed (FAQs , yes I read them)
From: [EMAIL PROTECTED] (Andy C)
Date: Mon, 11 Sep 2000 18:13:48 GMT

On 10 Sep 2000, [EMAIL PROTECTED] (Douglas A. Gwyn) spake in 
<[EMAIL PROTECTED]>:

>on the key.  That leaves just a loop that resembles a ciphertext
>autokey, initialized by a 32-bit "theKey".  It would be fairly
>easy for an attacker to try all 2^32 possible theKey values until
>one that works is found.

Thats what I thought - I was able to simply brute force the key, but lets 
suppose the lifespan of the data was 2-3 minutes tops.  THat would require 
either more resources than a standard home-user PC, or better technique.  THe 
latter is what I'm trying to develop with the (very) appreciated help from 
the folks here.


>If the words (including key) were wider,
>then a more clever attack would be required, but one ought to be
>possible since the algorithm is simple, consisting mainly of
>constant operations (two fixed rotations, two fixed additions).

Yes - this is what I'm trying to wrap my head around - what does ti take to 
actually break an algorithm.


>The << and >> are just used to obtain cyclic rotations of the word.

Good - I had figured as much, but being new, I was unsure as to any value to 
odd swapping added.  Swapping the upper 13 bits and then reswapping the upper 
9 bits - I though that maybe those particular splits (as opposed to even byte 
values) may have had some significance.  But other than obfuscation, I think 
they are just there to tangle things up a little.

>There is no particular reason -26087 (+39449) was used instead of
>another constant with similarly nice bit pattern (1001101000011001).

Hmm - I did the 2's complement and it worked out rather odd.  FFFF9A19, lots 
of "1111" nybbles at the beginning, so the addition only seems to do the "bit 
flipping" en-mass for a rather large chunk of the data word.  Is there any 
weakness there - those FFFF places look rather tempting to be able to cut 
down for key bit leaking, it has the effect of not doing much to a rather 
large number of bits.

I read the stuff you gus post in here and feel so far behind.  Thanks for the 
help in getting my mind tuned on this problem.


------------------------------

From: [EMAIL PROTECTED] (Yiorgos Adamopoulos)
Crossposted-To: comp.security.misc,alt.security,talk.politics.crypto,us.legal
Subject: Re: (Jury Selection) Re: Carnivore article in October CACM _Inside_Risks
Date: 11 Sep 2000 18:18:48 GMT
Reply-To: [EMAIL PROTECTED]

In article <[EMAIL PROTECTED]>, Robert H. Risch wrote:
>Do the judges decide on which witnesses will be called in a crime case
>and question them first?  Are witnesses allowed to tell their story in

No.  The ``defendant'' starts by calling whoever s/he wants.  Then the
prosecutor.  The judge may re-examine whoever witness s/he wants.

>their own words before questions start?  Am I correct that there are
>no juries when somebody is suing somebody else?  Are there 4 judges

This is how civil cases are executed.  Only penal code cases have
juries.  I thought we were targeting on them.

>then?  How much of a restriction is put on what kinds of questions are
>allowed to be asked?  Is there a difference in the kind of lawyer's

The judge is the judge on that :-)

>questions, based on whether the witness is considered to be friendly
>to the lawyer's point of view?  Are lawyers allowed to interview
>non-expert witnesses before the trial?  

Not ``hostile'' witnesses.

>I think the legal system in Greece has improved quite a bit since
>Plato's day.  However the sophists (we call them shysters) are firmly

I think you are writing this because we condemned Socrates.  Mistrials
happen all the time.  Even with ``famous'' people.  Socrates was against
the system and in some ways against the law.  Since the law was not
changed, he was guilty (dura lex, sed lex).  If you have the time,
please read Lysias. (he was a great non Athenian sophist who lived
in Athens).  His work / speach ``On behalf of the weak'' shows the
strengths of the system (which was different since it applied to 50K
civilians, 100K imigrants without civil rights and 200K slaves).

>in control in the US system.  Thanks for your information.

I do not know if they have an English version but http://www.lawnet.gr
could help :-)

------------------------------

Subject: Re: Getting Started, advice needed (FAQs , yes I read them)
From: [EMAIL PROTECTED] (Andy C)
Date: Mon, 11 Sep 2000 18:26:35 GMT

On 10 Sep 2000, [EMAIL PROTECTED] (Paul Pires) spake in 
<U_Yu5.60123$[EMAIL PROTECTED]>:

>Why would anyone brute force the key. It seems to me that if
>you can be made to encrypt some known material at the
>beginning of a file, I get your key using only a pencil and
>paper.

Well, I brute forced it because I'm no cryptanalyst, although I'd love to 
learn enough to at least be an amateur one.  Which is what I'm trying to get 
here - an idea of how to go about looking at such a thing.

And pardon the bad source - it has some rather obvious errors that I didnt 
correct in my haste to post.  Rather anxious to actually be able to post 
something other than noise to the group...


>first tempKey = theKey;
>
>>             temp1 = data[counter] + tempKey;
>>             temp1 = ((temp1 << 19) | (temp1 >>13)) - 26087;
>>             temp1 = ((temp1 << 23) | (temp1 >> 9));
>>             tempData[counter] = temp1;
>>             tempKey = tempKey + temp1 - 26087;
>
>Let's refrase the first cycle:
>
>             temp1 = plaintext + the honest to god key;
>             temp2 = ((temp1 << 19) | (temp1 >>13)) - 26087;
>             temp3 = ((temp1 << 23) | (temp1 >> 9));
>             ciphertext= temp3;
>             tempKey = tempKey + temp1 - 26087;
>
>This is reversible.

Thanks for the clarification of the algorithm, I thought as much - I think 
the encode/decode functions are simply inverses of each other using the same 
key.  If I have read th FAQ and Schneier right, this makes it symmetric?  And 
the "autokey" is where it changes the key based on the data - kind of a 
"chaining" thing?

>If I have the first ciphertext block then...
>temp2 = (Ctext>>23)|(Ctext<<9);
>temp1= ((temp2+26087)>>19)|((temp2+26087)<<13);
>
>If I have just the first plaintext block then:
>
>temp1-plaintext = your key...
>
>Unless I really screwed up here.
>
>Feel safe?

No, and thats good.  I had a feeling this could have been rather esaily done 
by someone "in the know".

Is there a way to actually write a "decode" routine - in other words, what I 
set out to do was creat an "anti-algorithm", one that could be fed a block of 
unknown ciphertext, and spit out the key.  I was thinking that was possible, 
but maybe a known or chosen plaintext would be needed.  What would you think 
about in terms of doing something like that?  Its not really needed, but 
would be a rather neat thing to try to come up with (and show off).

------------------------------

Subject: Re: Getting Started, advice needed (FAQs , yes I read them)
From: [EMAIL PROTECTED] (Andy C)
Date: Mon, 11 Sep 2000 18:38:48 GMT

On 10 Sep 2000, [EMAIL PROTECTED] (Scott Fluhrer) spake in 
<8phpk5$plr$[EMAIL PROTECTED]>:

>Paul Pires <[EMAIL PROTECTED]> wrote the original break

>Actually, this attack can be strengthened somewhat, in that it can be
>applied to any block (and, it relies on a known plaintext block, rather than
>a chosen one as you appeared to have implied).  Suppose you know/guess the
>value of plaintext block 10.  Then, you use the above attack to derive the
>value of tempKey at the start of the encryption of block 10.  Then, looking
>at the last two steps of the iteration for block 9:
>
>            tempData[counter] = temp1;
>            tempKey = tempKey + temp1 - 26087;
>
>or, in other words:
>
>            NEWtempKey = OLDtempKey + CiphertextBlock - 26087;
>
>(where NEWtempKey is the value of tempKey at the start of the encryption of
>block 10, OLDtempKey is the value of tempKey at the start of the encryption
>of block 9, and CiphertextBlock is the value of the 9th ciphertext block).
>
>The attacker knows the ciphertext for block 9 (tempData[counter]), and he
>knows the new value of tempKey, and so he can compute the previous value of
>tempKey.  And, he can work his way back to the beginning of the cipher.

And thus recover the starting key?  The software I was looking at uses the 
same key for a whole session - so recovering it once allows the whole session 
to be recovered.  *BUT* the lifespan of session information usefulness is 
only 2-3 minutes, so this may be a "safe" method, if an "automated" way of 
breaking the keys back is not found.  By the way, in case you are concerned, 
we are not doing anything "illegal" with such a short key and timespan - this 
is for something more on the recreational side of the internet.

Thank you for this explanation of how the algorithm can be reversed from a 
known plaintext block.  This begs the question - how does one go about 
guessing a "known" plaintext in any reasonable amount of time?  Just trying 
to get the thought processes in my head.

Any particular places I should go to read and learn?

------------------------------

From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Re: Capability of memorizing passwords
Date: Mon, 11 Sep 2000 20:52:31 +0200


I was informed that Ross Anderson has a paper about 'The 
Memorability and Security of Passwords -- Some Empirical 
Results' on http://www.cl.cam.ac.uk:80/users/rja14/

It contains essential informations about the present topic.

M. K. Shen

------------------------------

From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Re: Camellia, a competitor of AES ?
Date: Mon, 11 Sep 2000 20:52:55 +0200



[EMAIL PROTECTED] wrote:
> 
> You misunderstand me. The fact is that the final AES winner will have
> been more studied than anything submitted to the ISO. That's an
> obvious result of the fact that AES has been studied now, in addition
> to moving through the ISO process. Other canidates would only be
> looked at during the ISO process.
> 
> There is, on the other hand, a chance that some national body has a
> better design than any of the ISO finalists. Given the strategic
> benefits of such an algorithm, however, I doubt we'd actually see it
> appear.

You are right. On the other hand, I am not yet very convinced
that the AES candidates have been sufficiently well studied.
Recently there was a thread questioning about the S-boxes of
one of them. The AES documents are apparently not entirely
complete, in particular there are numerical constants that
the reader must take for granted, much like with the old DES.
I personally find it a bit difficult to conceive that a 
really solid analysis could be done as long as fully complete 
documentation of an algorithm is not available.

M. K. Shen

------------------------------

From: "David C. Barber" <[EMAIL PROTECTED]>
Subject: Re: ExCSS Source Code
Date: Mon, 11 Sep 2000 11:47:56 -0700

Excuse me but, if we can put 2 full movies onto a 650MB CD, why do we need
DVD in the first place?

    *David Barber*

"Ichinin" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
> > True, since pirates don't do byte-by-byte copies to writable media
anyhow.
>
> Yes, but it CAN be done without breaking the encryption. Hidings special
> commands in a system is plain stupid.
>
> > Most pirate copies of DVDs are actually made on the exact same equipment
that
> > makes the "legit" copies, sometimes even in the exact same factories.
Amazing,
> > what a little bribery of factory managers being paid $8 per week will
get you
> > :-).
>
> Probably, yes :o) Actually, the "Pirates" i know convert the whole 4+
> Gig
> shabang into standard MPEG then squish it using DivX and can put 2
> movies
> on a single 650 MB cd. That's 3 hours and 45 minutes(!)
>
> > Err, the U.S. has a million men in uniform and billions of dollars in
> > expensive military hardware that say different.
>
> Humpty dumpty sat on a wall, humpty got a virus and fell down.
>
> /Ichinin



------------------------------

From: "David C. Barber" <[EMAIL PROTECTED]>
Subject: Re: ExCSS Source Code
Date: Mon, 11 Sep 2000 11:49:49 -0700

LOL.

"zapzing" <[EMAIL PROTECTED]> wrote in message
news:8pbgva$h99$[EMAIL PROTECTED]...
> In article <8pbf55$1cf6$[EMAIL PROTECTED]>,
>   "David C. Barber" <[EMAIL PROTECTED]> wrote:
> > IMHO why not just spam every usenet group with the deCSS code once a
> week?
> > It would be more interesting than the Make Money Fast and/or Visit My
> Porn
> > Site spam that we get too much of.
>
> Maybe we could put all three together and come up with
> a real winner: make money from home illegally decoding
> porno DVDs !
>
> --
> "Sarcasm: the last refuge of modest and
> chaste-souled people when the privacy of
> their soul is coarsely and intrusively invaded."
>  --Dostoyevsky--
>
>
> Sent via Deja.com http://www.deja.com/
> Before you buy.



------------------------------


** FOR YOUR REFERENCE **

The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:

    Internet: [EMAIL PROTECTED]

You can send mail to the entire list (and sci.crypt) via:

    Internet: [EMAIL PROTECTED]

End of Cryptography-Digest Digest
******************************

Reply via email to