Re: Russia Intercepts US Military Communications?

2003-03-31 Thread (Mr) Lyn R. Kennedy
On Sun, Mar 30, 2003 at 07:38:29PM -0500, reusch wrote:
 
 I'm amazed at their claims of radio interception. One would 
 expect that all US military communications, even trivial ones, 
 are strongly encrypted, given the ease of doing this. Someone, 
 more well informed, please reassure me that this is the case.

It's not the case. I routinely listen in on communications. Most of
the planes have either KY-57 or Have Quick. The KY is digital and
probably better than DES encryption. Adequate except for stupidly
using AM (Amplidude Modulation, aka ancient modulation) which along
with poor maintenance makes it often unusable.

Have Quick is actually anti-jam and often mistaken for encryption.
Likely the Russians can read it.

The real problem is that flaky encrypted comms are a tactical problem
so it is often better to use clear comms when time is the issue. Not
too helpful to know what's about to happen if you can't do anything
about it anyway.

 
 Otherwise, yet another thing is very wrong about this war and
 the infrastructure that supports it. -MFR

It's amazing to me to listen to engineers try a test 15 times and then
when it finally works, declare victory and go on to the next one. The
military industrial complex is about money, not reliable high-tech systems.

I was more impressed with American expertise 40 years ago than I am now.


-- 
-
| 73,E-mail   | [EMAIL PROTECTED]  |
| Lyn Kennedywebpage  | http://home.earthlink.net/~lrkn |
| K5QWB  ICBM | 32.5 North 96.9 West|
---Livin' on an information dirt road a few miles off the superhighway---

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Russia Intercepts US Military Communications?

2003-03-31 Thread (Mr) Lyn R. Kennedy
On Mon, Mar 31, 2003 at 02:59:11PM -0500, [EMAIL PROTECTED] wrote:

  I am much more concerned about the
 apparent lack of good IFF (missile batteries lighting up
 the RAF plane that they then shot down; the USAF plane that 
 reacted to being lit up by firing at and destroying the 
 ground radar; stories about our close air-support firing
 on our tanks and other ground units)!  This sounds like it
 is very close to criminal negligence!  Do these units NOT
 have IFF or are they not using it or does it just not work
 all of the time ?  Geraldo wants to know!! - chazzchezz

IFF is no longer limited to 6x8-foot Union Jacks flown by British vehicles
but it's obvious there are still problems. Considering how much effort I
know about in the last ten years, one would think they have every plane,
vehicle, and ship tagged with something.

My father fought WWII in Dallas, installing IFF in airplanes. Plenty of
time to perfect these concepts.


One needs to keep in mind that the problem is often simple failure to
communicate. The Combat Air Patrols over the US in the last year give
some insight: Fighters in Texas taking direction from Florida rather
than talking to the Air Traffic Controllers below. I listen to private
pilots near Dubya's ranch complaining about being attacked by F-16s
while following directions from ATC. The F-16s chase scheduled airliners
into Waco. Perhaps they don't have weapons and that is all that has saved 
planes from being shot down in Texas.


-- 
-
| 73,E-mail   | [EMAIL PROTECTED]  |
| Lyn Kennedywebpage  | http://home.earthlink.net/~lrkn |
| K5QWB  ICBM | 32.5 North 96.9 West|
---Livin' on an information dirt road a few miles off the superhighway---

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Scientists question electronic voting

2003-03-08 Thread (Mr) Lyn R. Kennedy
On Fri, Mar 07, 2003 at 02:55:19PM -0500, Barney Wolff wrote:
 On Fri, Mar 07, 2003 at 12:45:41PM -0600, (Mr) Lyn R. Kennedy wrote:
  
  Seems there is still a problem unless each eligible voter brings a smart-
  card, warm finger, eyeball, etc.
 
 This is a perfect example of what I'm complaining about:  You're holding
 electronic voting to a much higher standard than you are paper ballots.

If it's not a higher standard then it violates the If it aint broke, don't
fixit rule. But I'm concerned about KISS and the right tool for the
job more than anything.

 
 Perfect is the enemy of better.  We do have to take care that electronic
 voting does not introduce new and catastrophic vulnerabilities.  Other
 than that, it merely has to be better (and no more expensive) than the
 best existing systems.

Unfortunately, there is a trend toward more complex systems as a solution
to everything. Families of firefighters who died in the WTC collapse would
probably have been happier if they had the old low-tech radios from 20
years ago rather than whiz-bang gadgetry that failed. There was no plan
to fall back on since politicians believed the salesman who told them it
wouldn't fail. And the proposed fix is more complexity rather than the
right tools for the job.

This is what happened in the Florida elections as well. Upgrading the
voting systems was the problem, not the solution. More complex machines
add to the number of failure modes. I'm in favor of using modern
technology. But I don't want to move to electronic systems just to make
some salesman happy.

Modern technology and public-key cryptography seems to offer some real
advantages to verifying eligibility, one-person-one-vote, and vote-
whever-you-are but many such issues are not even addressed. Passed over
in favor of making money for voting machine companies.


-- 
-
| 73,E-mail   | [EMAIL PROTECTED]  |
| Lyn Kennedywebpage  | http://home.earthlink.net/~lrkn |
| K5QWB  ICBM | 32.5 North 96.9 West|
---Livin' on an information dirt road a few miles off the superhighway---

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Scientists question electronic voting

2003-03-07 Thread (Mr) Lyn R. Kennedy
On Thu, Mar 06, 2003 at 10:35:22PM -0500, Barney Wolff wrote:
 
 We certainly don't want an electronic system that is more
 vulnerable than existing systems, but sticking with known-to-be-terrible
 systems is not a sensible choice either.

Paper ballots, folded, and dropped into a large transparent box, is not a
broken system. It's voting machines, punch cards, etc that are broken.
I don't recall seeing news pictures of an election in any other western
democracy where they used machines.

And the Florida election was apparently affected more by eligible voters
turned away from the polls than by votes sold. Maybe crypto, smart-cards,
biometrics, etc would help authenticate voter eligibility and enforce one
vote per live voter (zero per dead voter).



-- 
-
| 73,E-mail   | [EMAIL PROTECTED]  |
| Lyn Kennedywebpage  | http://home.earthlink.net/~lrkn |
| K5QWB  ICBM | 32.5 North 96.9 West|
---Livin' on an information dirt road a few miles off the superhighway---

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Scientists question electronic voting

2003-03-07 Thread (Mr) Lyn R. Kennedy
On Fri, Mar 07, 2003 at 02:22:23AM -0500, Barney Wolff wrote:
 On Fri, Mar 07, 2003 at 12:50:44AM -0600, (Mr) Lyn R. Kennedy wrote:
  
  Paper ballots, folded, and dropped into a large transparent box, is not a
  broken system. It's voting machines, punch cards, etc that are broken.
  I don't recall seeing news pictures of an election in any other western
  democracy where they used machines.
 
 Surely you jest - where else did the term ballot-stuffing come from?

Perhaps you can elaborate on how ballot-stuffing is done without the
co-operation of most of the people overseeing a polling place.

 
 The key, imho, is =2 independent means of counting the votes.  Online,
 as each vote is cast, and a paper trail, for later reconciliation.
 It's hard for both to be skewed by the same amount, and differences
 will both raise suspicion and give an order of magnitude of the fraud.
 That seems to be the direction the experts are heading.

What is to prevent the people overseeing a polling place from casting the
votes for the dead? They would be recorded properly both ways.

Or they could void and re-vote for ordinary voters.


Seems there is still a problem unless each eligible voter brings a smart-
card, warm finger, eyeball, etc.



-- 
-
| 73,E-mail   | [EMAIL PROTECTED]  |
| Lyn Kennedywebpage  | http://home.earthlink.net/~lrkn |
| K5QWB  ICBM | 32.5 North 96.9 West|
---Livin' on an information dirt road a few miles off the superhighway---

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Shamir factoring machine uninteresting?

2003-01-26 Thread (Mr) Lyn R. Kennedy
On Sun, Jan 26, 2003 at 07:29:08PM -0500, Perry E. Metzger wrote:
 
 I find it odd that there has been so little comment on TWIRL. One
 would think that the crushing of 512 bit RSA keys and a strong
 demonstration of the weakness of 1024 bit RSA keys would have provoked
 some comment on the list.
 
 Any comments on why no one commented?

It's easier to consider it unimportant than calculate how important it
might be. My questions here trying to understand how significant some
other weaknesses might be make me think most readers are afraid to admit
they don't understand some things.

Is this a mathematician vs engineer problem? (I'm neither, I'm an inventor).



-- 
-
| 73,E-mail   | [EMAIL PROTECTED]  |
| Lyn Kennedywebpage  | http://home.earthlink.net/~lrkn |
| K5QWB  ICBM | 32.5 North 96.9 West|
---Livin' on an information dirt road a few miles off the superhighway---

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]