Re: [cryptography] regarding the NSA crypto breakthrough

2013-09-07 Thread Alan Braggins
On 06/09/13 21:21, Tony Arcieri wrote: There are curves not selected by e.g. NIST with a published rationale for their selection, like Curve25519. Is there any reason why such curves can't be evaluated retroactively? http://cr.yp.to/ecdh/curve25519-20060209.pdf

Re: [cryptography] Compositing Ciphers?

2013-09-07 Thread Nico Williams
We have a purely (now mostly) all-symmetric key protocol: Needham-Schroeder -- Kerberos. Guess what: it doesn't scale, not without a strong dose of PK (and other things). Worse, its trusted third parties can do more than MITM/impersonate you like PKI's: they get to see your session keys (unless

Re: [cryptography] Compositing Ciphers?

2013-09-07 Thread Sandy Harris
Jeffrey Walton noloa...@gmail.com wrote: With all the talk of the NSA poisoning NIST, would it be wise to composite ciphers? (NY Times, Guardian, Dr. Green's blog, et seq). I've been thinking about running a fast inner stream cipher (Salsa20 without a MAC) and wrapping it in AES with an

Re: [cryptography] what has the NSA broken?

2013-09-07 Thread David Johnston
On 9/6/2013 6:58 AM, Ralph Holz wrote: Hi, On 09/06/2013 07:12 AM, James A. Donald wrote: Most private keys are issued by, not merely certified by, the CAs. Can you give numerical evidence for this claim? Device certificates (those that go into mass manufactured products) typically have

Re: [cryptography] Random number generation influenced, HW RNG

2013-09-07 Thread David Johnston
On 9/6/2013 2:03 PM, grarpamp wrote: Does anyone put any stock into the rumors floating lately that the government may have influenced Intel and/or AMD into altering However, I claim that the fear is well founded and should be taken into account by all threat models. It interesting to

Re: [cryptography] [tor-talk] NIST approved crypto in Tor?

2013-09-07 Thread Eugen Leitl
- Forwarded message from Nick Mathewson ni...@alum.mit.edu - Date: Sat, 7 Sep 2013 13:02:04 -0400 From: Nick Mathewson ni...@alum.mit.edu To: tor-t...@lists.torproject.org tor-t...@lists.torproject.org Subject: Re: [tor-talk] NIST approved crypto in Tor? Reply-To:

Re: [cryptography] Random number generation influenced, HW RNG

2013-09-07 Thread Jeffrey Walton
On Sat, Sep 7, 2013 at 1:48 PM, David Johnston d...@deadhat.com wrote: On 9/6/2013 2:03 PM, grarpamp wrote: ... However, I claim that the fear is well founded and should be taken into account by all threat models. It interesting to consider the possibilities of corruption and deception that

Re: [cryptography] Random number generation influenced, HW RNG

2013-09-07 Thread James A. Donald
On 2013-09-08 3:48 AM, David Johnston wrote: Claiming the NSA colluded with intel to backdoor RdRand is also to accuse me personally of having colluded with the NSA in producing a subverted design. I did not. Well, since you personally did this, would you care to explain the very strange

Re: [cryptography] [liberationtech] Random number generation being influenced - rumors

2013-09-07 Thread James A. Donald
On 2013-09-07 9:14 PM, Eugen Leitl wrote: That's the claimed design, yes. I see no particular reason to believe that the hardware in my server implements the design. I can't even test that the AES whitening does what it is documented to do, because Intel refused to provide access to the

Re: [cryptography] Random number generation influenced, HW RNG

2013-09-07 Thread Thor Lancelot Simon
On Sun, Sep 08, 2013 at 08:34:53AM +1000, James A. Donald wrote: Well, since you personally did this, would you care to explain the very strange design decision to whiten the numbers on chip, and not provide direct access to the raw unwhitened output. You know as soon as anyone complained

Re: [cryptography] Random number generation influenced, HW RNG

2013-09-07 Thread James A. Donald
On 2013-09-08 1:25 PM, Thor Lancelot Simon wrote: On Sun, Sep 08, 2013 at 08:34:53AM +1000, James A. Donald wrote: Well, since you personally did this, would you care to explain the very strange design decision to whiten the numbers on chip, and not provide direct access to the raw unwhitened