Cryptography-Digest Digest #281, Volume #10 Mon, 20 Sep 99 16:13:04 EDT
Contents:
Re: Okay "experts," how do you do it? (John Savard)
Re: Comments on ECC ("Joseph Ashwood")
Re: Okay "experts," how do you do it? ("Joseph Ashwood")
Re: some information theory (SCOTT19U.ZIP_GUY)
Re: Yarrow: a problem -- am I imagining it? (Eric Lee Green)
Re: Ritter's paper (Mok-Kong Shen)
Re: Which of these books are better ? (Anton Stiglic)
Re: (US) Administration Updates Encryption Export Policy (SCOTT19U.ZIP_GUY)
Re: Okay "experts," how do you do it? ("Trevor Jackson, III")
Re: Glossary of undefineable crypto terms (was Re: Ritter's paper) (Patrick Juola)
From: [EMAIL PROTECTED] (John Savard)
Subject: Re: Okay "experts," how do you do it?
Date: Mon, 20 Sep 1999 18:00:17 GMT
Sundial Services [EMAIL PROTECTED] wrote, in part:
Fighting this notion of human supremacy as long as I can, :-), and for
the sake of argument :-) :-), I submit again the contrarian question...
exactly WHAT is it that we are learning?
Is it simply an issue that we don't have an effective way to represent
the cipher in a way that the computer can be made to test it? I
question this, because nearly all ciphers these days are computer
functions. The computer does the encipherment; why can't the computer
readily test the quality of the encipherment? If humans alone can do
this testing then... "why? why? why??"
C'mon, gentlebeings, play along. ;-)
Computers are good at doing arithmetic, and "doing the encipherment"
is just doing arithmetic.
Pattern recognition is much harder.
Of course some elementary statistical tests on ciphertext can be
easily computerized, but it's trivial to design a cipher system to
pass those tests, and passing them doesn't imply security.
Studying a cipher design, and finding flaws unique to that design,
requires real thought. Original thought isn't something easily
computerizable; what cryptanalysts do is similar to what
mathematicians do, and computers aren't in danger of replacing _them_
any time soon either.
John Savard ( teneerf- )
http://www.ecn.ab.ca/~jsavard/crypto.htm
--
From: "Joseph Ashwood" [EMAIL PROTECTED]
Subject: Re: Comments on ECC
Date: Mon, 20 Sep 1999 10:53:55 -0700
[snip]
Especially when one considers the source of the quoted
statement (the "A" in RSA), it should be taken with a grain of salt, as
ECC is
an algorithmic competitor to RSA and is "stronger, shorter, faster, etc."
[snip]
Actually having spent a significant amount of time discussing cryptography
in general, and public-key cryptography in particular, with Adleman, I have
confidence in his abilities and lack of his ego getting in the way of his
judgement. He has even been known to tell his classes that he believes that
the factoring problem will fall, and take RSA with it. I will admit that he
did say that he wasn't sure if he'd live long enough to see it fall, but
then again I'm not even truly convinced that the factoring problem will
completely fall. While Adleman may not have built the reputation of Rivest
in the cryptographic field, he is in his own right a relatively unbiased
individual, and I will gladly say that if he has his doubts about ECC, then
I will need to see proof (not simply speculation) to the contrary.
Joseph
--
From: "Joseph Ashwood" [EMAIL PROTECTED]
Subject: Re: Okay "experts," how do you do it?
Date: Mon, 20 Sep 1999 11:29:48 -0700
I propose this as sort of a step in the right direction (towards a good test
box).
We simply implement every know break, and use them to create a fuzzy value
(floating point unmber [0,1]) indicating the assuredness of the security of
the design. While this could in no way help us with something as powerful as
the AES candidates, it would eliminate a large number of ciphers that are
insecure, and would allow the examination of new methods to progress to a
developmental stae instead of simlpy having to go over old ground over and
over. I'm sure that with our combined knowledge we would be able to develop
a series of tests that would test for the known varients of Slide, Linear,
Differential, etc tests, and we could expand it as more information becomes
available. Who knows maybe it'll help us actually do something useful with
our lives instead of all of us trying to use a Slide attack on Scott19
(whether or not it works, the point remains that having 100's of people
doing the same thing is wasted effort), also given these fuzzy values we
could optimize our attack knowing where the holes are likely to be, if there
are any. That means that at any given time there would exist a computer
program capable of near state of the art cryptanalysis, something absolutely
vital in ord