Re: Wikileaks video crypto.

2010-04-09 Thread Thomas Coppi
On Fri, Apr 9, 2010 at 13:06, Perry E. Metzger pe...@piermont.com wrote:

 The video was apparently intentionally given to Wikileaks, so one can't
 imagine that the releasing parties would have wanted it to be unreadable
 by them (or that any reasonable modern cryptosystem would have be
 crackable). What, then, does the decryption claim mean here. Does
 anyone know? majord...@metzdowd.com


This site http://leaks.telecomix.org/ claims to have the original,
unencrypted video. It appears to have been encrypted with OpenSSL given the
Salted__ prefix.

-- 
Thomas Coppi
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: [tahoe-dev] SHA-1 broken!

2009-05-04 Thread Thomas Coppi
On Sun, May 3, 2009 at 4:35 PM, Christian Rechberger
christian.rechber...@tugraz.at wrote:
 The design of DES facilitates this kind of throughput/cost gains on FPGAs.

 Remember that the MD4 family (incl. SHA-1) was designed to be efficient on
 32-bit CPUs. For these hash functions, it is much harder to get a
 throughput/cost gain on FPGAs compared to off-the-shelf CPUs. At least, this
 was my conclusion when I quickly looked into this a few years ago.


The n...@home project(http://nsa.unaligned.org/) seems to do it pretty well.
He even provides the optimized SHA-1 and MD5 Verilog code used.  This only works
because straight-up bruteforce requires little memory, though. If the new
SHA-1 break requires significant memory usage I don't think something
like the COPACOBANA can help.

Regards,
-- 
Thomas Coppi

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Proof of Work - atmospheric carbon

2009-01-30 Thread Thomas Coppi
On Wed, Jan 28, 2009 at 2:19 PM, John Levine jo...@iecc.com wrote:
 Indeed.  And don't forget that through the magic of botnets, the bad
 guys have vastly more compute power available than the good guys.

 Just out of curiosity, does anyone happen to know of any documented
examples of a botnet being used for something more interesting than
just sending spam or DDoS?

-- 
Thomas Coppi

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com