Re: Key Pair Agreement?

2003-01-21 Thread Joseph Ashwood
- Original Message - From: Jeroen C. van Gelderen [EMAIL PROTECTED] Here is a scenario: Scott wants Alice to generate a key pair after which he will receive Alice's public key. At the same time, Scott wants to make sure that this key pair is newly generated (has not been used before).

Re: Key Pair Agreement?

2003-01-21 Thread bear
On Mon, 20 Jan 2003, Jeroen C. van Gelderen wrote: Hi, Here is a scenario: Scott wants Alice to generate a key pair after which he will receive Alice's public key. At the same time, Scott wants to make sure that this key pair is newly generated (has not been used before). I do not know what

Re: Key Pair Agreement?

2003-01-21 Thread Hal Finney
Jeroen writes: Here is a scenario: Scott wants Alice to generate a key pair after which he will receive Alice's public key. At the same time, Scott wants to make sure that this key pair is newly generated (has not been used before). How about a discrete log key where you fix p, q, and g.

Re: Key Pair Agreement?

2003-01-21 Thread Anton Stiglic
I do not know what the proper terminology is to discuss this. Assuming there is none, I will call the solution Key Pair Agreement. Call it kosherized public key generation. Kosherization is not a term often used in theoretical cryptography, but it is often used in practice It would seem that

PATRIOT/FISA: New Powers Fuel Legal Assault On Suspected TerrorSupporters

2003-01-21 Thread R. A. Hettinga
http://online.wsj.com/article_print/0,,SB1043113086596504224,00.html The Wall Street Journal January 21, 2003 New Powers Fuel Legal Assault On Suspected Terror Supporters By GLENN R. SIMPSON and JESS BRAVIN Staff Reporters of THE WALL STREET JOURNAL WASHINGTON -- Quietly deploying new

Patents as a security mechanism

2003-01-21 Thread Matt Blaze
Patents were originally intended, and are usually used (for better or for worse), as a mechanism for protecting inventors and their licensees from competition. But I've noticed a couple of areas where patents are also used as a security mechanism, aiming to prevent the unauthorized production of

deadbeef attack was choose low order RSA bits (Re: Key Pair Agreement?)

2003-01-21 Thread Adam Back
On Mon, Jan 20, 2003 at 09:08:31PM -0500, Radia Perlman wrote: [...] I was going to suggest something similar to what David Wagner suggested, but with Scott telling Alice the modulus size and the *high* order 64 bits (with the top bit constrained to be 1). I can see how Alice can easily

Re: Patents as a security mechanism

2003-01-21 Thread Ben Laurie
Matt Blaze wrote: Patents were originally intended, and are usually used (for better or for worse), as a mechanism for protecting inventors and their licensees from competition. But I've noticed a couple of areas where patents are also used as a security mechanism, aiming to prevent the

Re: Patents as a security mechanism

2003-01-21 Thread John S. Denker
Matt Blaze wrote: Patents were originally intended, and are usually used (for better or for worse), as a mechanism for protecting inventors and their licensees from competition. That's an oversimplification. Patents were originally intended as a bargain between the inventors and the society

Re: Key Pair Agreement?

2003-01-21 Thread Hal Finney
Another problem with this problem is that there are trivial solutions because it is difficult to ensure that SEED1 is functionally essential in the public key. For example, generate a public key PK using a normal method, and define the new public key PK' = (PK, SEED1). Then to encrypt to PK' the

Re: Key Pair Agreement?

2003-01-21 Thread Greg Rose
At 09:08 PM 1/20/2003 -0500, Radia Perlman - Boston Center for Networking wrote: I was going to suggest something similar to what David Wagner suggested, but with Scott telling Alice the modulus size and the *high* order 64 bits (with the top bit constrained to be 1). I can see how Alice can

Re: Key Pair Agreement?

2003-01-21 Thread Anton Stiglic
I can see how Alice can easily generate two primes whose product will have that *high* order part, but it seems hard to generate an RSA modulus with a specific *low* order 64 bits. It is easy in both cases, here are examples I easily came up with: (low order DEADBEEF)) p =

CodeCon presentations announced and registration open

2003-01-21 Thread Len Sassaman
CodeCon 2.0 is the premier event in 2003 for the P2P, Cypherpunk, and network/security application developer community. It is a workshop for developers of real-world applications with working code and active development projects. CodeCon registration is $95; a $15 discount is available for

Re: Patents as a security mechanism

2003-01-21 Thread Matthew Byng-Maddick
On Tue, Jan 21, 2003 at 11:02:25AM -0500, Matt Blaze wrote: One example close to home is the DVD patents, which, in addition to providing income for the DVD patent holders, also allows them to prevent the production of players that don't meet certain requirements. This effectively reduces the

Verizon must comply with RIAA's DMCA subpoena

2003-01-21 Thread William Allen Simpson
Declan McCullagh recently posted an interesting article on a legal opinion: http://news.com.com/2100-1023-981449.html He's placed the decision here: http://www.politechbot.com/docs/verizon.riaa.decision.012103.pdf All this to learn the identity of a computer at a particular IP address.

Re: deadbeef attack was choose low order RSA bits (Re: Key Pair Agreement?)

2003-01-21 Thread Peter Gutmann
Adam Back [EMAIL PROTECTED] writes: On Mon, Jan 20, 2003 at 09:08:31PM -0500, Radia Perlman wrote: [...] I was going to suggest something similar to what David Wagner suggested, but with Scott telling Alice the modulus size and the *high* order 64 bits (with the top bit constrained to be 1). I can