Cryptography-Digest Digest #100, Volume #10      Mon, 23 Aug 99 22:13:03 EDT

Contents:
  Re: IDEA in Applied Crypto ([EMAIL PROTECTED])
  Re: Ciphile Software (OFF TOPIC) (wtshaw)
  3-Donut Hole Effect (Daniel Ward)
  Re: Where to find (David Hamilton)
  Re: Where to find (David Hamilton)
  Re: Can I export software with decryption code only? (Timur Tabi)
  Re: Triple DES (168bit) -- Triple DES (112bit) (Stefan Lucks)
  How Easy Can Terrorists Get Strong Encrypt? (Greg)
  shameless plug (Tom St Denis)
  Re: How Easy Can Terrorists Get Strong Encrypt? (Tom St Denis)
  Re: I need strongest weak elliptic curve... (DJohn37050)
  Re: CBC problems... (Tom St Denis)
  Re: Blowfish algorithm - Is it full proof? (Dave Hazelwood)

----------------------------------------------------------------------------

From: [EMAIL PROTECTED]
Subject: Re: IDEA in Applied Crypto
Date: Mon, 23 Aug 1999 20:51:02 GMT

In article <[EMAIL PROTECTED]>,
  Stephan Eisvogel <[EMAIL PROTECTED]> wrote:
> Tom St Denis wrote:
> > So I will ask, does anybody know of any errata from the IDEA C code
> > from Applied Crypto?
>
> I recently messed around with side-channel attack papers to harden
> some of my own code against it. You can go to
>
>   http://www.ascom.ch/infosec/downloads.html
>
> and download the revised IDEA 2.1 code. There's also plenty of test
> vectors to verify your code against. If decryption doesn't return
> the plaintext you started with, check for byte-ordering bugs. My
> first IDEA code for a microcontroller had that thing wrong in the
> key-setup routine and it almost drove me mad... heheh!
>
> Good luck,
> --se
>

Before you use IDEA, check out it's homepage.  I believe it's owned by
Entrust, but I don't have my AC2 book handy.  Anyway, they fixed the
multiply so that it can resist side-channal attacks better.  If I
remember correctly, it will run faster with the modification if you
optimize your code.

Casey


Sent via Deja.com http://www.deja.com/
Share what you know. Learn what you don't.

------------------------------

From: [EMAIL PROTECTED] (wtshaw)
Crossposted-To: talk.politics.crypto
Subject: Re: Ciphile Software (OFF TOPIC)
Date: Mon, 23 Aug 1999 15:30:05 -0600

In article <7pr6os$[EMAIL PROTECTED]>, Tommy the Terrorist
<[EMAIL PROTECTED]> wrote:

> In article <[EMAIL PROTECTED]> [    Dr. Jeff    ],
> [EMAIL PROTECTED] writes:
> >Okay, so no one in sci.crypt has any idea about or interest in talking 
> >about Ciphile Software's Original Absolute Privacy Level 3 software.  
> >Why is that? Is the software not considered good? Do people have 
> 
> Dude, sci.crypt is supposed to be about the SCIENCE of 
> cryptography, not some software program.

Lest you forget, if you ever knew, applied science means actually doing
something with an idea, not sitting on a stump with platonic cryptological
thoughts.

> ...Why don't you have another look
> around the newsgroups, especially the comp.* newsgroups, and
> see if you can find something with some people who know more
> about your particular platform and software?

Sci.crypt is the place to discuss such things, as long as it has to do
directly with a cryptological aspect.  Programming problems might be dealt
with elsewhere if it is something not exclusively crypto, but partaining
to a specific crypto related program and the way that special crypto
things are done, sci.crypt is still the place.
-- 
All's fair in love, war, and crypto.  ERACE

------------------------------

From: Daniel Ward <[EMAIL PROTECTED]>
Subject: 3-Donut Hole Effect
Date: Mon, 23 Aug 1999 16:15:15 -0500

This is a cryptographically signed message in MIME format.

==============msCC57361F91962A5E9CA2988D
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

I was wondering what the security community thinks of this.

I have noticed that multiple products working in conjunction
can cause what I refer to as:
"multiple levels of self invoking  encryption" or MLOSE
or the 3-Donut Hole Effect.

So for example if you were sending an a 3DES encrypted file
over an SSL-FTP connection where IPSEC was invoked
for a VPN then you would have 2 layers of self engaged
cryptography occuring and 1 layer of user imposed crypto.
Probably a few other permutations of this out there too. Toss
in some steganography if you like....


Does anyone recognize the impacts from a legal and wire
tap perspective? What about the possible conflicting or
supporting algorithms? Impacts on virus scanning? A whole
host of other things I have not even thought of yet. I am thinking
law enforcement has no idea what they are up against on this
topic, its kinda scary.

My thinking is that this scenario will become totally unavoidable
and transparent to the end-user.

Anyone want to conjecture on additional viewpoints. I am curious.

Dan Ward
Caterpillar Inc.

==============msCC57361F91962A5E9CA2988D
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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==============msCC57361F91962A5E9CA2988D==


------------------------------

From: [EMAIL PROTECTED] (David Hamilton)
Subject: Re: Where to find
Date: Mon, 23 Aug 1999 22:21:38 GMT

=====BEGIN PGP SIGNED MESSAGE=====

[EMAIL PROTECTED] (SCOTT19U.ZIP_GUY) wrote:

(snip)

>   It may be arrogance but I am sure many Navy Pilots owe me unknownly
>for fixing many potentail dangerous errors introduced by the kind of 
>programers that some one of your limited back ground would respect.

And the tooth fairy lives.


David Hamilton.  Only I give the right to read what I write and PGP allows me
                           to make that choice. Use PGP now.
I have revoked 2048 bit RSA key ID 0x40F703B9. Please do not use. Do use:-
2048bit rsa ID=0xFA412179  Fp=08DE A9CB D8D8 B282 FA14 58F6 69CE D32D
4096bit dh ID=0xA07AEA5E Fp=28BA 9E4C CA47 09C3 7B8A CE14 36F3 3560 A07A EA5E
Both keys dated 1998/04/08 with sole UserID=<[EMAIL PROTECTED]>
=====BEGIN PGP SIGNATURE=====
Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com>
Comment: Signed with 2048 bit RSA key

iQEVAwUBN8HHvMo1RmX6QSF5AQHwWQgAn4HW/ItZdAqHliCjmDvN6YWN+eqri3NW
bq/60Jud/Rq5/vIkB4xfZNqhQqV1UAHXE1tusuWgKcgR81enueLCOOIh1xxh7O7G
tJiATAayzjEdskTsHty0CjTrhMk8GSoRpBqdriGOtXCbeIGem6nBtFjlXUu52MjY
Sk/3aYglSKA3eP+zxIVyBJFfaVemU6o/zFZJIGavHYm/jQEpADfIj/AM8Luxw3mt
0Nvt86L3jD95wiKQW9yb/ywz4qLwe1STJiYT122bw8XGIr1bQLXMdRZLuHDkXDac
y/wkqVfAY4qnV8KiGhQCvZFVLiYm0K5SUK2tNFfaxdWWe7FB8f+XZA==
=R3lg
=====END PGP SIGNATURE=====

------------------------------

From: [EMAIL PROTECTED] (David Hamilton)
Subject: Re: Where to find
Date: Mon, 23 Aug 1999 22:53:03 GMT

=====BEGIN PGP SIGNED MESSAGE=====

"karl malbrain" <[EMAIL PROTECTED]> wrote:

>David Hamilton <[EMAIL PROTECTED]> wrote in message
>news:[EMAIL PROTECTED]...
>> -----BEGIN PGP SIGNED MESSAGE-----
>>
>> [EMAIL PROTECTED] (SCOTT19U.ZIP_GUY) wrote:
>>
>> (snip)
>>
>> >    I design as I code. Which is the way I have coded the last 30 years
>> >and airplanes and missles count on my ability to do this.
>>
>> This is silliness, arrogance and UNprofessionalism of the highest order.
>If
>> you design as you code, you do not design at all.
>
>Sorry,

That's OK.

>but there is nothing wrong with using computer language CODES to
>workout, document and/or implement (i.e. materialize) design IDEAS.

Sigh. Can I be bothered? Given your above statement, what steps would YOU
omit between program specification and code? How would YOU document your
'design IDEAS'? When would YOU produce this documentation? Would you use any
pre-existing documents or outputs to base your design on? What would these
documents or outputs be? 

>There
>is also no professional requirement to express one's ideas in ENGLISH,
>either.

Produce the quote where I said that.


David Hamilton.  Only I give the right to read what I write and PGP allows me
                           to make that choice. Use PGP now.
I have revoked 2048 bit RSA key ID 0x40F703B9. Please do not use. Do use:-
2048bit rsa ID=0xFA412179  Fp=08DE A9CB D8D8 B282 FA14 58F6 69CE D32D
4096bit dh ID=0xA07AEA5E Fp=28BA 9E4C CA47 09C3 7B8A CE14 36F3 3560 A07A EA5E
Both keys dated 1998/04/08 with sole UserID=<[EMAIL PROTECTED]>
=====BEGIN PGP SIGNATURE=====
Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com>
Comment: Signed with 2048 bit RSA key

iQEVAwUBN8HPw8o1RmX6QSF5AQFPOQf9F5vntKvPOoC9Rzq5/L7yH2IhxYeBHkRf
6ACTlh8N5A3aisGdFT/niE/8ndoqh/WwQevZ5uokAbaAnklmG2OER2bQE1FUQgYw
zqCrGhwmHvqptUJw5+FF9VQBvOFFUSta5cwPMjq4B47aeaMxDZVLKyliI8+Pexfz
3F9FCXOt1VsW65A0DSXxbOLSWQ4Z99iVe7aNGl2XD69AiCQ/ocecq+YxH8MR6fIb
O1hMUNKWSxyZIaIjAHlar9aeIF/tm5L7z9Tx8axbTzTPw4RFF6PqDDtUYNWPuT67
eTrHMpm7Hx2EYPj26paveuyhtQggjslsEv8VhqZ8lNCnCGMrj0Zqmg==
=b1yR
=====END PGP SIGNATURE=====

------------------------------

From: Timur Tabi <[EMAIL PROTECTED]>
Subject: Re: Can I export software with decryption code only?
Date: Mon, 23 Aug 1999 22:30:31 GMT

In article <[EMAIL PROTECTED]>,
  John <[EMAIL PROTECTED]> wrote:
> I don't think there is any restriction, but you can check
> the DoD or Dept. of commerce for regulations. You aren't
> really putting out anyting that would endanger the
> national security, are you?

I've read something somewhere that says that decryption code intended
for copy protection that is not user-accessible can be exported.  This
is exactly what I'm doing.  Unfortunately, I can't seem to find the
official documents that allow this.  Does anyone have a URL?

--
Remove "nospam_" from my email address when replying
Timur "too sexy for my code" Tabi, [EMAIL PROTECTED]


Sent via Deja.com http://www.deja.com/
Share what you know. Learn what you don't.

------------------------------

From: Stefan Lucks <[EMAIL PROTECTED]>
Subject: Re: Triple DES (168bit) -- Triple DES (112bit)
Date: Wed, 18 Aug 1999 09:42:52 +0200

On Tue, 17 Aug 1999, Anton Stiglic wrote:

> Medical Electronics Lab wrote:
> 
> > Frank Piepiorra wrote:
> > >
> > > Several publications refer to Triple DES with the key size 168 bit or 112
> > > bit. Both seems to have Triple DES but what in detail, besides the key
> > > length :-) is the difference and does it have an impact on security?
> >
> > Use 3 keys: E(k3,D(k2,E(k1,message)))  == 168 bit key
> > Use 2 keys: E(k1,D(k2,E(k1,message)))  == 112 bit key
> >
> > Both methods are reported to have the same strength, 112 bits.
> > This is from the "meet in the middle" attack (I think).
> >
> > Patience, persistence, truth,
> > Dr. mike
> 
> I have heard of meet-in-the-middle attacks on 2 key DES
> (Merkle and Hellman 1981), and (Oorchot and Wiener, 1990),
> but not any against 168 bit key 3DES.  Please give me a ref if
> there exists one!

A MITM attack against three-key triple DES with a complexity of 2^112 is
trivial -- just don't meet in the middle, but either after the first or
the second DES-encryption. On one side, you iterate through 2^56 keys, on
the other side, you iterate through 2^(2*56)=2^112 keys, so the overall
complexity is (close to) 2^112.

You can do a little bit better than that, i.e. reduce the complexity down
to 2^108. See

http://th.informatik.uni-mannheim.de/People/Lucks/papers/3des.ps.gz



-- 
Stefan Lucks  Th. Informatik, Univ. Mannheim, 68131 Mannheim, A5, Germany
            e-mail: [EMAIL PROTECTED]
            home: http://th.informatik.uni-mannheim.de/m/lucks/
===== Wer einem Computer Unsinn erzaehlt, muss immer damit rechnen. =====



------------------------------

From: Greg <[EMAIL PROTECTED]>
Subject: How Easy Can Terrorists Get Strong Encrypt?
Date: Mon, 23 Aug 1999 23:28:32 GMT

In case anyone is interested, this came from WND...

Indeed, a recent study by the George Washington University School of
Engineering and Applied Science backs up Goodlatte. It found good
encryption programs available outside the United States on more than
800 Websites.

--
The US is not a democracy - US Constitution Article IV Section 4.
Democracy is the male majority legalizing rape.
UN Security Council is a Democracy.  NO APPEALS!  Welcome to the NWO.
Criminals=Crime.  Armies=Tyranny.  The 2nd amendment is about tyranny.


Sent via Deja.com http://www.deja.com/
Share what you know. Learn what you don't.

------------------------------

From: Tom St Denis <[EMAIL PROTECTED]>
Subject: shameless plug
Date: Mon, 23 Aug 1999 23:22:46 GMT

In article <7ps65h$9qa$[EMAIL PROTECTED]>,
  David A Molnar <[EMAIL PROTECTED]> wrote:
> Tom St Denis <[EMAIL PROTECTED]> wrote:
>
> >> http://ciphersaber.gurus.com
>
> > No offense but is that a plug?  RC4 is so simple you could explain
it
> > here no need to advertise.
>
> Check out the site - it's based on that fact. :>

Shameless plug...

Peekboo V1.2 soon to be out (Aug 30th) is a SIMPLE to use (pretty gui)
message encryptor for chat/email type applications.  It features
blowfish/cast-128/rc4/rc5/twofish/serpent and xxtea (xxtea is my toy
cipher which I wouldn't use but I am playing with).  It's only 33kb
right now and I plan to add more.  Plus it can make keys, automatically
encrypt/decrypt the clipboard (i.e copy from chat, paste to chat).

Nuff of that.  I will more formally talk about it on monday.

Hey above all the source code AND binaries will be avail.  No snake oil
here!

Tom
--
PGP 6.5.1 Key
http://mypage.goplay.com/tomstdenis/key.pgp
PGP 2.6.2  Key
http://mypage.goplay.com/tomstdenis/key_rsa.pgp


Sent via Deja.com http://www.deja.com/
Share what you know. Learn what you don't.

------------------------------

From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: How Easy Can Terrorists Get Strong Encrypt?
Date: Tue, 24 Aug 1999 00:26:35 GMT

In article <7pslek$t0g$[EMAIL PROTECTED]>,
  Greg <[EMAIL PROTECTED]> wrote:
> In case anyone is interested, this came from WND...
>
> Indeed, a recent study by the George Washington University School of
> Engineering and Applied Science backs up Goodlatte. It found good
> encryption programs available outside the United States on more than
> 800 Websites.
>

http://www.pgpi.com

point finale.

Tom
--
PGP 6.5.1 Key
http://mypage.goplay.com/tomstdenis/key.pgp
PGP 2.6.2  Key
http://mypage.goplay.com/tomstdenis/key_rsa.pgp


Sent via Deja.com http://www.deja.com/
Share what you know. Learn what you don't.

------------------------------

From: [EMAIL PROTECTED] (DJohn37050)
Subject: Re: I need strongest weak elliptic curve...
Date: 24 Aug 1999 01:39:07 GMT

113 ECC bits is about the same strength as 512 RSA/DH/DSA bits and 512 is what
is exportable.
Don Johnson

------------------------------

From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: CBC problems...
Date: Mon, 23 Aug 1999 15:18:29 GMT

was that a stupid question or what?

I was thinking of PCBC when I actually coded CBC... hmm ok... well
please don't reply I realize it was a stupid question.


Sent via Deja.com http://www.deja.com/
Share what you know. Learn what you don't.

------------------------------

From: [EMAIL PROTECTED] (Dave Hazelwood)
Crossposted-To: comp.lang.clipper,comp.security.misc,alt.politics.clinton
Subject: Re: Blowfish algorithm - Is it full proof?
Date: Tue, 24 Aug 1999 02:02:40 GMT

Ha ha. I guess you just don't get it? Look all over the net and you
will see references to Klinton and the Klintonista's.

Try any of the alt.?.clinton groups for starters.

Check this out too for a laugh. Yes, he has degraded his office and
all of us along with it so much that we can laugh at such things
because he deserves them.

http://www.geocities.com/Baja/Trails/3110/ccworld/cc06.gif

Now, we are even getting in the issue of politicians using cocaine!
How far have we fallen? The press is attacking Bush like crazy
but what about Klinton? It is common knowledge that he is a user
so why is the press protecting him again? Huh???

As voters we need to rid Washington and all our capitols (notice I got
the correct spelling) of this trash. 

This is off topic here and I apologize for that. let's move it to
alt.politics.clinton.

"Harlan Carvey, CISSP" <[EMAIL PROTECTED]> wrote:

>
>Who is this "Klinton" and why is he so evil?  You seem to be referencing
>events the President...you may not be the nut case you mention, but you
>sure as heck can't spell.
>


------------------------------


** FOR YOUR REFERENCE **

The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:

    Internet: [EMAIL PROTECTED]

You can send mail to the entire list (and sci.crypt) via:

    Internet: [EMAIL PROTECTED]

End of Cryptography-Digest Digest
******************************

Reply via email to