Re: Raw RSA

2006-09-08 Thread Leichter, Jerry
| Hi. | | If an attacker is given access to a raw RSA decryption oracle (the | oracle calculates c^d mod n for any c) is it possible to extract the | key (d)? If I hand you my public key, I have in effect handed you an oracle that will compute c^d mod n for any c. What you are asking is whether

Re: DNS/DNSSEC as an inbound mail signature public key distribution mechanism (was: signing all outbound email)

2006-09-08 Thread Thierry Moreau
Jon Callas wrote: [... about DKIM ...] The signature travels with the message and the signing key is in the network. As long as you have both, you can verify the signatures. the signing key is in the network -- Indeed. The public signature key is stored in the DNS. DKIM might be

Re: Raw RSA

2006-09-08 Thread Alexander Klimov
On Thu, 7 Sep 2006, Leichter, Jerry wrote: | If an attacker is given access to a raw RSA decryption oracle (the | oracle calculates c^d mod n for any c) is it possible to extract the | key (d)? If I hand you my public key, I have in effect handed you an oracle that will compute c^d mod n for

Re: A lack of US cryptanalytic security before Midway?

2006-09-08 Thread John Levine
The conventional wisdom is that the successful US cryptanalytic efforts against Japanese naval codes was a closely-held secret. Has the conventional wisdom forgotten that it was reported in the Chicago Tribune in 1942? See, for example, http://www.newseum.org/warstories/essay/secrecy.htm

Re: A lack of US cryptanalytic security before Midway?

2006-09-08 Thread Steven M. Bellovin
On 7 Sep 2006 15:33:15 -, John Levine [EMAIL PROTECTED] wrote: The conventional wisdom is that the successful US cryptanalytic efforts against Japanese naval codes was a closely-held secret. Has the conventional wisdom forgotten that it was reported in the Chicago Tribune in 1942?

Re: Locating private keys in RAM?

2006-09-08 Thread je
Check http://www.matasano.com/log/178/recover-a-private-key-from-process-memory/ or if you want to find the algorithms http://www.hexblog.com/2006/01/findcrypt.html On Mon, 4 Sep 2006, Douglas F. Calvert wrote: Hello, I remember seeing a paper about identifying private keys in RAM. I

Re: signing all outbound email

2006-09-08 Thread James A. Donald
-- Paul Hoffman wrote: At 11:40 AM +0200 9/5/06, Massimiliano Pala wrote: Jon Callas wrote: On 4 Sep 2006, at 4:13 AM, Travis H. wrote: Has anyone created hooks in MTAs so that they automagically [sign email] [...] Go look at http://www.dkim.org/ for many more details. This

Re: Raw RSA

2006-09-08 Thread Hal Finney
Alexander Klimov asks: If an attacker is given access to a raw RSA decryption oracle (the oracle calculates c^d mod n for any c) is it possible to extract the key (d)? This is equivalent to asking whether factoring reduces to RSA inversion. That is, given access to an RSA inversion oracle, can

Any opinions on Kryptor...?

2006-09-08 Thread Leandro Meiners
Dear list, Has anybody heard about Kryptor? Any opinions? (Link: http://www.rosiello.org/modules/smartsection/visit.php?fileid=1) Regards, Leandro Meiners.- -- Leandro Federico Meiners - The Cryptography Mailing List

secure key storage APIs

2006-09-08 Thread Travis H.
Hey, Does anyone know of any OSS OS facilities for managing keys? With ssh-agent and gpg-agent providing access to key storage by inherited processes, and the keys themselves being vulnerable as stored on-disk, I wonder if there isn't any more general facility for doing key management and

link fest on fingerprint biometrics

2006-09-08 Thread Travis H.
Found at doxpara.com: fingerprints: http://chris.fornax.net/biometrics.html faceprints: http://www.site.uottawa.ca/~adler/publications/2003/adler-2003-fr-templates.pdf More on fingerprints: http://onin.com/fp/cyanoho.html At home I have an excellent page on making fake fingerprints, but I

Enigma cracking machines reconstructed

2006-09-08 Thread Perry E. Metzger
LONDON (Reuters) - A code-cracking machine that enabled Britain to read Nazi military ciphers during World War Two has been rebuilt by enthusiasts after a 10-year project. http://news.scotsman.com/latest.cfm?id=1318542006format=print -- Perry E. Metzger[EMAIL PROTECTED]

Re: Raw RSA

2006-09-08 Thread Leichter, Jerry
| | If an attacker is given access to a raw RSA decryption oracle (the | | oracle calculates c^d mod n for any c) is it possible to extract the | | key (d)? | If I hand you my public key, I have in effect handed you an oracle that | will compute c^d mod n for any c. What you are asking is

RSA SecurID SID800 Token vulnerable by design

2006-09-08 Thread Hadmut Danisch
Hi, I recently tested an RSA SecurID SID800 Token http://www.rsasecurity.com/products/securid/datasheets/SID800_DS_0205.pdf The token is bundled with some windows software designed to make user's life easier. Interestingly, this software provides a function which directly copies the current