Re: MD5 trick

2006-04-19 Thread markus reichelt
* [EMAIL PROTECTED] wrote:

 Of course, it is a trick. Yesterday I updated my paper Tunnels in
 Hash Functions: MD5 Collisions Within a Minute
 (http://eprint.iacr.org/2006/105.pdf) and MD5 collision program
 (http://cryptography.hyperlink.cz/2006/web_version_1.zip).

just being curious: from what you write, it looks like a pure
win-only source. do you happen to have a version that compiles on
some kind of unix?

-- 
left blank, right bald


pgpEgnnT5f1MX.pgp
Description: PGP signature


Re: MD5 trick

2006-04-19 Thread Ariel Waissbein
Hi Vlastimil and group,

Gera Richarte has done some interesting work with executable files that
have the same MD5 hash. Take a look at
http://www.coresecurity.com/corelabs/projects/research_topics.php
to see his talk at PacSec `05 and Two executable files with the same
MD5 hash, crc32, checksum32 and checksum16.

Regards,
Ariel

vlastimil.klima wrote:
 The trick could be shortly expressed as follows:
 Give me three files and I will give you another three with the
 same MD5 hash
 


-- 
Ariel Waissbein
RESEARCHER
CORE SECURITY TECHNOLOGIES

http://www.coresecurity.com/corelabs






-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Not everyone knows about strong crypto...

2006-04-19 Thread Perry E. Metzger

It seems not everyone has gotten the message that monoalphabetic
substitution was broken many hundreds of years ago. Excerpt:

  The recently arrested boss of bosses of the Sicilian Mafia, Bernardo
  Provenzano, wrote notes using an encryption scheme similar to the one
  used by Julius Caesar more than 2,000 years ago, according to a
  biography of Italy's most wanted man.

http://dsc.discovery.com/news/briefs/20060417/mafiaboss_tec.html?source=rss

-- 
Perry E. Metzger[EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: NPR : E-Mail Encryption Rare in Everyday Use

2006-04-19 Thread markus reichelt
* Ian G [EMAIL PROTECTED] wrote:

 So, why not always sign messages to a list that permits
 signatures?
 
 It's hard to see the benefit, and it is easy to see the potential
 cost.  In a litiguous world, we are (slightly) better off not using
 messages that are going to haunt us in years to come.  As a
 principle, I'd never advise anyone to sign any message unless they
 could state what that meant.

Well, I for one value the spreading of cryptographic means higher
than what might happen due to some misguided lawyer. with all the
lost privacy due to so-called protection laws from all the
evildoers this has only strengthened my resolve. after all, the
lawyers are still there even if one doesn't use cryptographic means.

In my world there's just too much lobbyism involved not to take
action in the vital field of privacy. Most people using electronic
communications either believe that some occasional eavesdropping is
ok (for they have nothing to hide; an arguement solely given by the
state in some 1984 manner), or they don't grasp the extent of
eavesdropping possibilities, or they just don't bother. not bothering
is just equally bad as giving in to the state because if one remains
passive, it is not likely that one will change one's perception
easily switching to actively propagate one's ideals (because of a
certain receptiveness to state arguements). and nowadays it's hard
enough to change things even if one is actively involved.


 It could well be that this is a difference in view across the
 Atlantic.  It seems that many (continental) Europeans do not
 perceive a threat to themselves from things they write; whereas the
 English-centric world is more NDA obsessed.

I guess you mean Non-Disclosure Agreement by NDA. All those acronyms;
it's about time the A takes action.

I haven't really perceived it the way you describe, but I don't work
in an environment where such things could matter at all. I'm in the
scientific community (chemistry), and there limits of talk (if you
get the meaning) are described pretty well, and this only affects
some areas of competition.

Given that some individual or even organisation keeps track of its
employees' writings in/on public media, I barely see the benefits
apart from some cases where it comes to leaking info which is already
prohibited by some kind of Non-Disclosure Agreement. those exist here
too, but with all the transparency about it, one really has to be
utterly stupid to mess things up.

From what you write I get the impression that even the slightest hint
about even the slightest clue may cause one harm. In my opinion this
fuels fear, just like telling a teenager not to ever fall in love
because he'll only get hurt anyway. we have misguided lawyers here
too, far too many of them in fact, for about over 20 years, and they
need to get an income. all that increased sueing stuff can be traced
back to the growing numbers of lawyers hitting the open market. not
that it offers a solution but there's still the bottom of the ocean
or the moon, and mars may be an issue soon...


 Quite frankly, I wouldn't have thought this topic would emerge the
 way it has on a cryptography mailinglist. Maybe it's about time to
 publish my article Why Cryptography Is Important In Modern Life
 after all (don't hold your breath; with me being pretty busy it's
 not due until after eastern).
 
 Cryptography is a tool, not a religion, notwithstanding the desires
 of many to deify it.  It is the application that delivers benefits,
 and properly thought out apps generally use as little crypto as
 they can get away with.  Top-down applications thinking says use
 the tool that does the job whereas bottom-up, toolbox thinking
 says use this tool because it's so cool!

I guess you got me wrong, and I'm not sure I get your top-down,
bottom-up analogies. Anyway, I'm not propagating means of
cryptography because of a religious hype or something. to clarify
this, me and my friends are not amused by officials having the legal
means to listen in on email communications, phone conversations, etc.
both without prior suspicion and some kind of notification of the
person(s) being listened in to, let alone legal backup (it was
rendered redundant anyway). because of the terrorist-threat-hype such
processes are now accelerated to fit only the state's benefits, yet
they sold as a citizen's benefit altogether. we have a saying here (i
hope it carries over, i'm not a native english speaker): working at
such a hectic pace replaces an intellectual calm.

From what I wrote above I guess it can be boiled down to this. Means
of cryptography are valued because of the possibility to protect
one's privacy that the state obviously has deemed unnecessary, for
good citizens surely don't have something to hide. simply put, since
we all don't walk the street naked, the state always wins. such a
state is out of balance, and checks are most likely still in place
where they possibly can't influence a larger picture.

someone 

fyi: Deniable File System - Rubberhose

2006-04-19 Thread Jeff . Hodges
From: Owen Blacker [EMAIL PROTECTED]
Subject: Deniable File System
To: UK Crypto list [EMAIL PROTECTED]
Date: Wed, 19 Apr 2006 11:43:18 +0100 (BST)
Reply-To: [EMAIL PROTECTED]

http://www.schneier.com/blog/archives/2006/04/deniable_file_s.html

Some years ago I did some design work on something I called a Deniable 
File System. The basic idea was the fact that the existence of 
ciphertext can in itself be incriminating, regardless of whether or not 
anyone can decrypt it. I wanted to create a file system that was 
deniable: where encrypted files looked like random noise, and where it 
was impossible to prove either the existence or non-existence of 
encrypted files.

This turns out to be a very hard problem for a whole lot of reasons, and 
I never pursued the project. But I just discovered a file system that 
seems to meet all of my design criteria -- Rubberhose 
http://iq.org/~proff/rubberhose.org/ :

Rubberhose transparently and deniably encrypts disk data, minimising
the effectiveness of warrants, coersive interrogations and other
compulsive mechanims, such as U.K RIP legislation. Rubberhose differs
from conventional disk encryption systems in that it has an advanced
modular architecture, self-test suite, is more secure, portable,
utilises information hiding (steganography / deniable cryptography),
works with any file system and has source freely available.

The devil really is in the details with something like this, and I would 
hesitate to use this in places where it really matters without some 
extensive review. But I'm pleased to see that someone is working on this 
problem.

Next request: A deniable file system that fits on a USB token, and 
leaves no trace on the machine it's plugged into.


- -- 
Owen Blacker, London GB
Say no to ID cards: www.no2id.net
- --
They that can give up essential liberty to obtain a little temporary
  safety deserve neither liberty nor safety --Benjamin Franklin, 1759


--

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Not everyone knows about strong crypto...

2006-04-19 Thread mis
and a second data point, not everyone in the mafia chooses good passphrases;

a few years ago the government got a black bag warrant (once and a
renewal) to install some still undescribed keystroke monitoring
technology on nicky scarfo jr's pc, to find out the pgp key of a
spreadsheet of a smalltime mafioso whose hard drive they'd already
taken a copy of.

it turned out to be his father's federal prison number.


On Wed, Apr 19, 2006 at 11:10:49AM -0400, Perry E. Metzger wrote:
 
 It seems not everyone has gotten the message that monoalphabetic
 substitution was broken many hundreds of years ago. Excerpt:
 
   The recently arrested boss of bosses of the Sicilian Mafia, Bernardo
   Provenzano, wrote notes using an encryption scheme similar to the one
   used by Julius Caesar more than 2,000 years ago, according to a
   biography of Italy's most wanted man.
 
 http://dsc.discovery.com/news/briefs/20060417/mafiaboss_tec.html?source=rss
 
 -- 
 Perry E. Metzger  [EMAIL PROTECTED]
 
 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]