Re: [cryptography] Potential funding for crypto-related projects

2013-07-04 Thread danimoth
On 30/06/13 at 01:04am, Jacob Appelbaum wrote: Yeah, about that... Have you seen the most recent paper by Egger et al? IMHO that's is unfair. There are many publications on Tor vulnerabilities as well, and this is unavoidable. Are you sure that in the next two months Tor will not be the main

Re: [cryptography] SSL session resumption defective (Re: What project would you finance? [WAS: Potential funding for crypto-related projects])

2013-07-04 Thread Thierry Moreau
Thanks to Nico for bringing the focus on DH as the central ingredient of PFS. Nico Williams wrote: But first we'd have to get users to use cipher suites with PFS. We're not really there. Why? Perfect forward secrecy (PFS) is an abstract security property defined because Diffie-Hellman

Re: [cryptography] Potential funding for crypto-related projects

2013-07-04 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 04/07/13 13:34, danimoth wrote: IMHO that's is unfair. There are many publications on Tor vulnerabilities as well, and this is unavoidable. Are you sure that in the next two months Tor will not be the main actor of a similar publication?

Re: [cryptography] Potential funding for crypto-related projects

2013-07-04 Thread John Young
The more fiercely defended security system (anything) the more likely indefensible. Best ones require constant patching and understatement, without exculpation, apologia and bullying arrogance of ignorance. But cloying humility, obsequiousness and masochism seduces sadists for backdooring STD.

Re: [cryptography] SSL session resumption defective (Re: What project would you finance? [WAS: Potential funding for crypto-related projects])

2013-07-04 Thread Adam Back
Forward secrecy is exceedingly important security property. Without it an attacker can store encrypted messages via passive eavesdropping, or court order an any infrastructure that records messages (advertised or covert) and then obtain the private key via burglary, subpoena, coercion or

Re: [cryptography] Potential funding for crypto-related projects

2013-07-04 Thread danimoth
On 04/07/13 at 04:28pm, Michael Rogers wrote: I think the point is that i2p's decision to use a decentralised directory service led to the vulnerabilities described in the paper. Uhm, I don't consider it a matter of centralization vs decentralization. I think the point is how I2P select peers

Re: [cryptography] SSL session resumption defective (Re: What project would you finance? [WAS: Potential funding for crypto-related projects])

2013-07-04 Thread Thierry Moreau
Adam Back wrote: Forward secrecy is exceedingly important security property. Without it an attacker can store encrypted messages via passive eavesdropping, or court order an any infrastructure that records messages (advertised or covert) and then obtain the private key via burglary,

Re: [cryptography] Potential funding for crypto-related projects

2013-07-04 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 04/07/13 17:15, danimoth wrote: Uhm, I don't consider it a matter of centralization vs decentralization. I think the point is how I2P select peers to communicate with; attacker DoS'd previous high-performance peers, then replace them with nodes

Re: [cryptography] SSL session resumption defective (Re: What project would you finance? [WAS: Potential funding for crypto-related projects])

2013-07-04 Thread Adam Back
I do not think it is a narrow difference. End point compromise via subpoena, physical seizing, or court mandated disclosure are far different things than pre-emptive storing and later decryption. The scale at which a society will do them, and tolerate doing them given their inherently increased

[cryptography] DeCryptocat

2013-07-04 Thread Silas Cutler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Sorry, long time lurker, first time poster. Hate my first post to be a negative one. http://tobtu.com/decryptocat.php Brief DecryptoCat v0.1 cracks the ECC public keys generated by Cryptocat https://crypto.cat/ versions 1.1.147 through 2.0.41.

Re: [cryptography] DeCryptocat

2013-07-04 Thread James A. Donald
On 2013-07-05 6:34 AM, Silas Cutler wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Sorry, long time lurker, first time poster. Hate my first post to be a negative one. http://tobtu.com/decryptocat.php Brief DecryptoCat v0.1 cracks the ECC public keys generated by Cryptocat

Re: [cryptography] DeCryptocat

2013-07-04 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 04/07/13 22:07, James A. Donald wrote: 106 bits is still far too small. Seems to me that they only increased it as needed to defeat DecryptoCat, not as needed to defeat an NSA farm running dedicated special purpose hardware. Why not use an

Re: [cryptography] DeCryptocat

2013-07-04 Thread James A. Donald
On 2013-07-05 7:18 AM, Michael Rogers wrote: The choice of curve wasn't the problem - they were using Curve25519 but messing up the random number generation. Ah, I see. They have company. ___ cryptography mailing list cryptography@randombit.net

[cryptography] Recommendations for glossary of cryptographic terms

2013-07-04 Thread Kevin W. Wall
I am trying to wrap of the writing of the cryptography section of the new OWASP Dev Guide 2013 and rather than writing all my definitions, my thought was to just refer to some good glossary of cryptographic terms rather than doing all that work over again (and probably not as well). Does anyone

Re: [cryptography] DeCryptocat

2013-07-04 Thread Nadim Kobeissi
Hello everyone, I urge you to read our response at the Cryptocat Development Blog, which strongly clarifies the situation: https://blog.crypto.cat/2013/07/new-critical-vulnerability-in-cryptocat-details/ Thank you, NK On 2013-07-04, at 11:38 PM, James A. Donald jam...@echeque.com wrote: On

Re: [cryptography] Recommendations for glossary of cryptographic terms

2013-07-04 Thread Moritz
Hi, On 04.07.2013 23:50, Kevin W. Wall wrote: Does anyone have any recommendations for one that would be understandable by most in the development community who have little or now understanding of cryptography? Maybe you want to cover not only crypto, but also basic anonymity terminology:

Re: [cryptography] Recommendations for glossary of cryptographic terms

2013-07-04 Thread =JeffH
I am trying to wrap of the writing of the cryptography section of the new OWASP Dev Guide 2013 and rather than writing all my definitions, my thought was to just refer to some good glossary of cryptographic terms rather than doing all that work over again (and probably not as well). this

Re: [cryptography] Recommendations for glossary of cryptographic terms

2013-07-04 Thread =JeffH
Maybe you want to cover not only crypto, but also basic anonymity terminology: http://dud.inf.tu-dresden.de/Anon_Terminology.shtml yes, the above is another excellent resource. for crypto specific stuff, there's also.. http://www.ciphersbyritter.com/GLOSSARY.HTM RSA Labs - PKCS

Re: [cryptography] DeCryptocat

2013-07-04 Thread Nadim Kobeissi
On 2013-07-05, at 3:15 AM, Jacob Appelbaum ja...@appelbaum.net wrote: Nadim Kobeissi: Hello everyone, I urge you to read our response at the Cryptocat Development Blog, which strongly clarifies the situation:

Re: [cryptography] DeCryptocat

2013-07-04 Thread Jacob Appelbaum
Nadim Kobeissi: On 2013-07-05, at 3:15 AM, Jacob Appelbaum ja...@appelbaum.net wrote: Nadim Kobeissi: Hello everyone, I urge you to read our response at the Cryptocat Development Blog, which strongly clarifies the situation:

Re: [cryptography] DeCryptocat

2013-07-04 Thread Matthew Green
On Jul 5, 2013, at 12:01 AM, Jacob Appelbaum ja...@appelbaum.net wrote: Nadim Kobeissi: On 2013-07-05, at 3:15 AM, Jacob Appelbaum ja...@appelbaum.net wrote: Nadim Kobeissi: Hello everyone, I urge you to read our response at the Cryptocat Development Blog, which strongly clarifies

[cryptography] libzerocoin

2013-07-04 Thread Matthew Green
Hi everyone, We've released the source to libzerocoin, a library that implements the core cryptographic routines for the Zerocoin protocol. https://github.com/Zerocoin/libzerocoin This is still development code and we'd appreciate any code review people can offer. Please tear it apart.

Re: [cryptography] DeCryptocat

2013-07-04 Thread Nadim Kobeissi
On 2013-07-05, at 6:15 AM, Matthew Green matthewdgr...@gmail.com wrote: On Jul 5, 2013, at 12:01 AM, Jacob Appelbaum ja...@appelbaum.net wrote: Nadim Kobeissi: On 2013-07-05, at 3:15 AM, Jacob Appelbaum ja...@appelbaum.net wrote: Nadim Kobeissi: Hello everyone, I urge you to read

Re: [cryptography] DeCryptocat

2013-07-04 Thread Nadim Kobeissi
On 2013-07-05, at 6:59 AM, Cool Hand Luke coolhandl...@coolhandluke.org wrote: Signed PGP part On 07/05, Nadim Kobeissi wrote: On 2013-07-05, at 3:15 AM, Jacob Appelbaum ja...@appelbaum.net wrote: Has there been a rotation of the certificate and keying material for all services that

[cryptography] Testing list access from mail.i2p

2013-07-04 Thread str4d
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Sorry for the test post - I'm checking whether this mailing list will accept emails from @mail.i2p addresses (they should get rewritten to @i2pmail.org externally, which is what I used to sign up with). str4d -BEGIN PGP SIGNATURE- Version:

Re: [cryptography] DeCryptocat

2013-07-04 Thread Peter Gutmann
Nadim Kobeissi na...@nadim.cc writes: AES-GCM is already prioritized over RC4, but unfortunately most browsers don't support AES-GCM yet, which is why RC4 remains as the secondary choice. In the case that AES-GCM is not supported, we use RC4 instead of AES-CBC in order to mitigate for BEAST. If