Re: Piercing network anonymity in real time

2006-05-14 Thread Ivan Krstic
[EMAIL PROTECTED] wrote: The Locate appliance sits passively on the network and analyzes packets in real time to garner ID info from sources like Active Directory, IM and e-mail traffic, then associates this data with network information. This is really nothing new --

picking a hash function to be encrypted

2006-05-14 Thread Travis H.
So... Suppose I want a function to provide integrity and authentication, and that is to be combined with a stream cipher (as is the plaintext). I believe that authentication is free once I have integrity given the fact that the hash value is superencrypted using the stream cipher, whose key is

Re: picking a hash function to be encrypted

2006-05-14 Thread Victor Duchovni
On Sun, May 14, 2006 at 03:04:41AM -0500, Travis H. wrote: Suppose I want a function to provide integrity and authentication, and that is to be combined with a stream cipher (as is the plaintext). I believe that authentication is free once I have integrity given the fact that the hash value

Re: Piercing network anonymity in real time

2006-05-14 Thread StealthMonger
Ivan Krstic [EMAIL PROTECTED] writes: Calling this piercing network anonymity in real time is highly misleading; in reality, it's more like making it bloody obvious that there's no such thing as network anonymity. No. Ever hear of Chaum's Dining Cryptographers [1]? Anonymity right there at

Re: picking a hash function to be encrypted

2006-05-14 Thread Travis H.
On 5/14/06, Eric Rescorla [EMAIL PROTECTED] wrote: Consider the case where you're transmitting message M. The hash is H(M). You then encrypt (M || H(M)), generating K XOR (M || H(M)). If the attacker knows M and H, he can compute (M || H(M)) and compute K. Then he can re-encrypt a message M' of

Re: picking a hash function to be encrypted

2006-05-14 Thread Travis H.
On 5/14/06, Victor Duchovni [EMAIL PROTECTED] wrote: Security is fragile. Deviating from well understood primitives may be good research, but is not good engineering. Especially fragile are: Point taken. This is not for a production system, it's a research thing. TLS (available via OpenSSL)

the meaning of linearity, was Re: picking a hash function to be encrypted

2006-05-14 Thread Travis H.
- Stream ciphers (additive) This reminds me, when people talk about linearity with regard to a function, for example CRCs, exactly what sense of the word do they mean? I can understand f(x) = ax + b being linear, but how exactly does XOR get involved, and are there +-linear functions and

Re: picking a hash function to be encrypted

2006-05-14 Thread Victor Duchovni
On Sun, May 14, 2006 at 07:56:17PM -0500, Travis H. wrote: On 5/14/06, Victor Duchovni [EMAIL PROTECTED] wrote: Security is fragile. Deviating from well understood primitives may be good research, but is not good engineering. Especially fragile are: Point taken. This is not for a