Cryptography-Digest Digest #811, Volume #8 Tue, 29 Dec 98 22:13:03 EST
Contents:
Re: Opinions on S/MIME ("Rich Ankney")
Re: History of Cryptanalysis ("Don Chiasson")
Re: History of Cryptanalysis ("Don Chiasson")
Re: Session keys in Elliptic Curve ([EMAIL PROTECTED])
Re: [Q. newbie] Authentication/Digital Signatures (Harpy-34)
----------------------------------------------------------------------------
From: "Rich Ankney" <[EMAIL PROTECTED]>
Subject: Re: Opinions on S/MIME
Date: 30 Dec 1998 00:13:16 GMT
This is from the PKIX (not S/MIME) RFC set. Sam is not quite correct that
Proof of Possession (PoP) is the same as sending your private key to the
CA. PoP allows the user to prove to the CA that he knows a private key
(e.g., sign a challenge with your private key, decrypt a challenge with
your
private key, etc.). The ability to archive your private key IS an OPTIONAL
part
of both PKIX certificate management protocols (CMP and CMC) but is not
the same as PoP.
Regards,
Rich
Brad Aisa <[EMAIL PROTECTED]> wrote in article <[EMAIL PROTECTED]>...
> Sam,
>
> Thanks for your detailed and instructive response. The thing that most
> disturbed me (apart from the 1024-bit key limit), was this:
>
> Sam Simpson wrote:
>
> > One of the S/Mime standard documents [PKIX98] describes a "feature" of
> > S/Mime called "Proof of Possession of Private Key". This is a
mechanism
> > whereby end users private keys are deposited with the CA when
certification
> > is requested. This is a very worrying inclusion and makes the
> > implementation of mandatory key escrow a trivial matter. The PGP draft
> > standard contains no such references to key recovery technology.
>
> Does this mean that when I obtained a certificate from Thawte, that my
> *private key* was transmitted to them???
>
> Please tell me it ain't so...
>
> --
> Brad Aisa
> [EMAIL PROTECTED]
> S/MIME signed using freemail ID from www.thawte.com
>
> "Laissez faire."
------------------------------
From: "Don Chiasson" <[EMAIL PROTECTED]>
Subject: Re: History of Cryptanalysis
Date: Tue, 29 Dec 1998 18:00:40 -0500
Another classic (is it still in print?) is Herbert O. Yardley's
"The American Black Chamber", originallly published in 1931.
It is about American code breaking from 1913 until 1929 when
secretary of state Stimson shut down the operation with a
remark to the effect that "Gentlemen do not read other people's
mail." It is a good read.
Don
Ian McConnell wrote in message ...
>Plenty has been written about the cracking of the German and Japanese codes
>during World War II, but there seems to be little information on the
>cryptanalysis that was carried out pre-WW2. ...........
------------------------------
From: "Don Chiasson" <[EMAIL PROTECTED]>
Subject: Re: History of Cryptanalysis
Date: Tue, 29 Dec 1998 18:00:40 -0500
Another classic (is it still in print?) is Herbert O. Yardley's
"The American Black Chamber", originallly published in 1931.
It is about American code breaking from 1913 until 1929 when
secretary of state Stimson shut down the operation with a
remark to the effect that "Gentlemen do not read other people's
mail." It is a good read.
Don
Ian McConnell wrote in message ...
>Plenty has been written about the cracking of the German and Japanese codes
>during World War II, but there seems to be little information on the
>cryptanalysis that was carried out pre-WW2. ...........
------------------------------
From: [EMAIL PROTECTED]
Subject: Re: Session keys in Elliptic Curve
Date: Wed, 30 Dec 1998 00:04:05 GMT
Hi guys, about a year ago, I was handed a demo encryption/decryption
program in QBASIC that handles 128-bit encrypted messages. A few months ago,
I post a message about it in one of these forums, and you guys said that
my program didn't work right. Well, I would like to know if that's true or
not.
In your reply, please leave a short, encrypted message, along with its
password. Please keep the message short, and I'll type it into the program.
I'll let you know if it works or not for sure. Okay?
Alan
============= Posted via Deja News, The Discussion Network ============
http://www.dejanews.com/ Search, Read, Discuss, or Start Your Own
------------------------------
From: Harpy-34 <[EMAIL PROTECTED]>
Subject: Re: [Q. newbie] Authentication/Digital Signatures
Date: Tue, 29 Dec 1998 17:59:52 -1000
Thomas Harte ([EMAIL PROTECTED]) wrote:
[...]
: I should perhaps have been a trifle more clear in my posting. I was
: wondering if there is a means of _publicly_ verifying an authenticated
: message by means of an authentication/signature-only protocol, viz. one
: that enables the public at large to verify that Alice, say, is the
sender of
: a
: particular message (e.g. by using "reverse" public-key cryptography),
but
: that does not rely on public-key cryptography as this is, _per se
: _,
: a form of encryption and thus subject to encryption laws.
In <[EMAIL PROTECTED]> Harpy-34 wrote:
> This can be used for encryption. Alice wants to encrypt a file [etc.]
Thomas Harte ([EMAIL PROTECTED]) wrote:
"So, what's the answer to my question, please? :)
Is there a means of publicly verifying a signature such that the
signature protocol cannot be turned into an encryption algorithm?
Harpy-whatsit seems to be saying that there is _always_ a way to
encrypt if authentication is performed.
Even though I am a complete neophyte in cryptological terms,
I shouldn't have thought that I am the first person to have posed
this question. Perhaps it is thought to be of no consequence?
But I cannot see how it should be, given that authentication is
of such import, and that encryption is akin to arms dealing as
far as the US legislature is concerned.
Does anyone care whether or not an algorithm can potentially
be used for encryption? Rivest's chaffing and winnowing shows
that popular authentication mechanisms can be subverted to the
cause of encryption without actually altering/reversing/interfering
with the authentication algorithm itself: the mere fact that
authentication
is performed is enough to form the basis of encryption.
But Rivest's approach is sufficiently indirect to render the
authentication algorithm innocent of any charge of encryption,
potential or otherwise.
Is there even an existence theorem as to possibility of having
signature-only algorithms (one-way signatures)?
Thanks, Thomas."
Harpy-34
is happy to
reply with a
fresh statement !
I already told you
how ANY authentication,
any signature, any Message
Authentication Code (MAC) software
can be used to produce a One Time Pad
by using a counter as input to the legal
software. But this was for one person who
was archiving ciphertext without key exchange
problems. I will now go one step further, and show how
any Public Key signature standard can be used as a liminal
channel so that two people can send encrypted messages within
a signature that can be verified by any person using the public key.
To begin the protocol, Alice and Bob communicate with each other in
secret,
not to share a secret key, but to establish this protocol. Alice
creates a
message and signs it using hur private key. The message content
is not important,
but it is a message which seems to have value on its own,
much like this post
seems to have some value, separate from the sentence
parsing protocol which is
being used to communicate something to John which
is not related to your neophyte
interests. The message and its signature are
posted on a website and the public
can use Alice's public key to verify the
message. Bob downloads the message and
the signature. In this post I am not
going to tell you the secret calculation
which Alice and Bob agreed upon,
example calculations will come in my next
post. Bob uses the calculation
to determine what characteristic the signature
must have before he will send
a reply message. Bob creates several possible messages,
signs them with his private
key, and examines the signatures to decide whether any of
these binary numbers meet
the criteria which were established during the secret meeting.
When he finds a signature which meets the criteria, Bob then will
use this message and this signature as his reply. He posts
his reply on his website and public people can verify
the signature with Bob's public key. Alice downloads
the message and signature. She can now extract
several encrypted bits of information from the
signature, knowing that Bob would only send
hur a signature if it had a binary value
which conforms with the criteria which
they have previously arranged. They
continue exchanging many messages
and after a few rounds of this
innocent-seeming
communications,
Alice
has accumulated
128 bits of binary information
which can be used in phase two, to be described in
a later post. These two people have now bootstrapped a secure
channel which will grow in sophistication,
as phase two and phase three
provide them with
plaintext
instructions for modifying their protocol
so it will become more efficient with each passing week.
After a year has passed, they have exchanged, with this protocol,
codebooks and stego software like that which is
used to interpret this post to sci.crypt.
Osprey-2/3/190/17
NO!
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and sci.crypt) via:
Internet: [EMAIL PROTECTED]
End of Cryptography-Digest Digest
******************************