Cryptography-Digest Digest #417, Volume #9       Sun, 18 Apr 99 19:13:03 EDT

Contents:
  Re: Thought question:  why do public ciphers use only simple ops like    (Uri 
Blumenthal)
  dumb question on releasing source code ("Chris Cavitt")
  Re: AES Competition (Jerry Coffin)
  Re: Thought question:  why do public ciphers use only simple ops like shift and XOR? 
(John Savard)
  Re: SNAKE#13 (Peter Gunn)
  Re: Comments on Boomerang Attack Sought (John Savard)
  Re: dumb question on releasing source code ("Roger Schlafly")

----------------------------------------------------------------------------

From: Uri Blumenthal <[EMAIL PROTECTED]>
Subject: Re: Thought question:  why do public ciphers use only simple ops like   
Date: Sun, 18 Apr 1999 16:49:26 -0400
Reply-To: [EMAIL PROTECTED]

At least one publicly known cipher (GOST) uses ADD (a more
complex operation)...
-- 
Regards,
Uri
-=-=-==-=-=-
<Disclaimer>

------------------------------

From: "Chris Cavitt" <[EMAIL PROTECTED]>
Subject: dumb question on releasing source code
Date: Sun, 18 Apr 1999 17:01:05 -0400

I'm a college student at a US University, and I have several small crypto
programs(GoldWasser-Micalli, Blum-Goldwasser, etc) which use keys ranging
from 8 to 16bits. Is it legal under US law for me to post the source code to
these programs on my web page given the small key sizes, or is that illegal?
I thought I remembered a professor saying it was legal to post anything with
keys <56bits, but I wanted to see if anyone else knew offhand before I did
it.

Thanks for any help.

--
Chris Cavitt
([EMAIL PROTECTED])
Senior Computer Engineering Major,
Clarkson University




------------------------------

From: [EMAIL PROTECTED] (Jerry Coffin)
Subject: Re: AES Competition
Date: Sun, 18 Apr 1999 15:35:40 -0600

In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED] 
says...

[ ... ] 

> What would you call AES when it is renamed?

I think the convention usually used with programming languages is 
probably perfectly reasonable -- DES-2000 (or perhaps DES-00). 

------------------------------

From: [EMAIL PROTECTED] (John Savard)
Subject: Re: Thought question:  why do public ciphers use only simple ops like shift 
and XOR?
Date: Sun, 18 Apr 1999 22:09:10 GMT

"Steven Alexander" <[EMAIL PROTECTED]> wrote, in part:

>If I try to build a cipher and do
>not understand cryptanalysis I will not ahve any idea how to protect my
>cipher.  If you have a better way to design ciphers, please share.

You are right that avoiding known weaknesses is important, and
understanding cryptanalysis is important.

However, I think that there is a "better way to design ciphers" than to
place too much faith in the _present_ knowledge of cryptanalysis. A cipher
should be designed conservatively: not just in the sense of having a few
extra rounds, but in the sense of having extra complexities in its design
_far beyond_ those needed (nonlinear S-boxes, irregularities in the key
schedule) to frustrate _known_ methods of attack.

John Savard ( teenerf<- )
http://members.xoom.com/quadibloc/index.html

------------------------------

From: Peter Gunn <[EMAIL PROTECTED]>
Subject: Re: SNAKE#13
Date: Sun, 18 Apr 1999 22:45:18 +0100

Here is my latest and greatest idea for a "probabalistic"
SNAKE version... SNAKE#13-1...

A,B are random numbers
R,T are s bit random numbers with n bits set to 1
p is a large safe prime
H() is a one way hash (SHA or similar)
P=H(password)
h(x,y) is a function which creates a s bit value
    by XORing H(x,y) split into s bit quantities
U is the user identifier

1) A->B: (g^A)%p, U, T
2) B->A: (g^B)%p, R
3) A->B: E[H(g^AB)](h(g^AB,P,R) xor V)

if B is MITM he cant solve 'h(g^AB,P,R) xor V' for P
by brute force since he doesnt know V.

The real B accepts client if h(g^AB,P,R) XORed with
the value from the client results in a number with n
bits set to 1. Otherwise it disconnects.

4) B->A: E[H(g^AB)](h(g^AB,P,T) xor S)

similarly the client accepts the server if
h(g^AB,P,R) XORed with the value from the
server results in a number with n bits set to 1.
Otherwise it disconnects.

Problem is I dont know how to work out how much
information is being leaked and therefore how
long the lifespan of a password would be for different
values of s and n.

How can I work out how many s bit numbers contain
n bits set to 1??

:-)

PG.



------------------------------

From: [EMAIL PROTECTED] (John Savard)
Subject: Re: Comments on Boomerang Attack Sought
Date: Sun, 18 Apr 1999 22:16:43 GMT

James Frey <[EMAIL PROTECTED]> wrote, in part:

>I looked at you diagram, but it is labeled "butterfly attack" 
>instead of boomerang attack. Is that an error

Yes, it certainly is.

>To make this work the pairs P Q and P' Q' have a certain characteristic.
>This explanation is just to give the flavor of the paper, and I realize
>it may seem unintelligible without having the text in front of you.
>I only want to convey the 3-D diagram's usefulness.

Fortunately, I found his paper intelligible enough to draw my diagram -
doubtless, a lot like his, even though I hadn't had the chance to see it.

John Savard ( teenerf<- )
http://members.xoom.com/quadibloc/index.html

------------------------------

From: "Roger Schlafly" <[EMAIL PROTECTED]>
Subject: Re: dumb question on releasing source code
Date: Sun, 18 Apr 1999 14:22:21 -0700

Chris Cavitt wrote in message <7fdh2m$gp0$[EMAIL PROTECTED]>...
>I'm a college student at a US University, and I have several small crypto
>programs(GoldWasser-Micalli, Blum-Goldwasser, etc) which use keys ranging
>from 8 to 16bits. Is it legal under US law for me to post the source code
to
>these programs on my web page given the small key sizes, or is that
illegal?
>I thought I remembered a professor saying it was legal to post anything
with
>keys <56bits, but I wanted to see if anyone else knew offhand before I did
>it.

Your professor gave bad advice, but anything with 8 to 16 bit keys
would be just a toy implementation. Go ahead and post.




------------------------------


** FOR YOUR REFERENCE **

The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:

    Internet: [EMAIL PROTECTED]

You can send mail to the entire list (and sci.crypt) via:

    Internet: [EMAIL PROTECTED]

End of Cryptography-Digest Digest
******************************

Reply via email to