Cryptography-Digest Digest #302, Volume #10 Thu, 23 Sep 99 14:13:05 EDT
Contents:
Re: RSA 640 bits keys factored, French banking smart card system craked! (jerome)
factorisation of a 2 primes(short) product (jerome)
Re: International crypto restrictions (SCOTT19U.ZIP_GUY)
Re: RC4 or IBAA or ISAAC to generate large random numbers (Volker Hetzer)
Re: Decryption --Help!!! (Jim Gillogly)
Re: low diffie-hellman exponent (Tom St Denis)
Re: Securing Executables (Paul Koning)
Re: msg for Dave Scott (Tom St Denis)
Re: some information theory (very long plus 72K attchmt) (Tom St Denis)
Re: factorisation of a 2 primes(short) product (Jerry Coffin)
Re: RSA weak? (Tom Cooper)
Re: frequency of prime numbers? ("Douglas A. Gwyn")
UPDATE: 23rd Sep, UK Internet decryption and interception policy, SFS3.5
([EMAIL PROTECTED])
----------------------------------------------------------------------------
From: [EMAIL PROTECTED] (jerome)
Crossposted-To: alt.security.pgp
Subject: Re: RSA 640 bits keys factored, French banking smart card system craked!
Date: 23 Sep 1999 15:21:09 GMT
Reply-To: [EMAIL PROTECTED]
On Thu, 23 Sep 1999 01:51:24 +0200, Laurent PELE wrote:
>
>He didn't find any leak in the protocol, he didn't have any other choice to
>factor the key, it is said in the 2 pages interview in PirateMag September
>magazine in French.
>
is this interview availble online ? if not, would you mind reproduce it ?
i can translate it if needed.
obviously ask piratemag before but i dont think it is a problem because
it is a lot of advertissment for then.
------------------------------
From: [EMAIL PROTECTED] (jerome)
Subject: factorisation of a 2 primes(short) product
Date: 23 Sep 1999 15:06:05 GMT
Reply-To: [EMAIL PROTECTED]
i try to factor numbers of 240 bits which are the product of 2 primes of
120 bits and i want do that with the workstations i have (several
pentiumII/350). 2 questions:
1. is it possible ?
2. what are the algorithms to do that ?
------------------------------
From: [EMAIL PROTECTED] (SCOTT19U.ZIP_GUY)
Subject: Re: International crypto restrictions
Date: Thu, 23 Sep 1999 16:21:49 GMT
In article <[EMAIL PROTECTED]>, Eric
Lee Green <[EMAIL PROTECTED]> wrote:
>"SCOTT19U.ZIP_GUY" wrote:
>> >If you are not a U.S. citizen, you will have to obey a) the laws of
>> >whatever host country you are located in, and b) the laws of your own
>> >home country.
>> You make it sound like there is no conflict. Since you wrote
>> "and" it is more than possible the 2 sets of laws conflict.
>> Like what side of the sreet you drive on. Or do you arbitrary
>> get to decide which lwas are in force.
>
>You are correct, this is a constant source of irritance to international
>businessmen. For example, in many Third World countries the government
>bureaucrats are not paid enough to live on. They thus must, and are
>expected to, personally extract money from those who need government
>services in order to obtain the money necessary to survive. The locals
>consider this a normal cost of doing business. The U.S. government
>considers this bribery of government officials.
No the US government sees nothing wrong with this. Do you see
Clinton in trouble for taking all that chinese money that they may have
used to get the bomb. FUCK NO you live in a dream world US government
officals are among the most corrupt on earth.
>
>But the fact remains that the U.S. government expects you to follow U.S.
>law at all times, regardless of whether you are physically located in
>the U.S. or not. Heck, they even try to apply the same standards to
>foreign citizens -- anybody remember Manuel Noriega? Hell, he was
>president of a whole damned COUNTRY, and the U.S. went in with the
>Marines, kidnapped him, brought him to Miami, and put him on trial. For
>most countries, though, they just have to ask the host country politely
>for the extradition of the "arms trafficker".
>
Manuel Moriega is a good example of our political muscle he was not
a US citizen and I guess was not smart enough to realize our government
goes in many directions at once. That is while the CIA was paying him to
be corrupt another department of the governmnet did not like it. The UN
should have said something about it. But it has not. I don't see Mr
Wanger getting in trouble for his aid to ememies overseas. The fact
is you are violating laws if your living in beathing it is what a police
state is all avout. IF they want you they get you period.
David A. Scott
--
SCOTT19U.ZIP NOW AVAILABLE WORLD WIDE
http://www.jim.com/jamesd/Kong/scott19u.zip
http://members.xoom.com/ecil/index.htm
NOTE EMAIL address is for SPAMERS
------------------------------
From: Volker Hetzer <[EMAIL PROTECTED]>
Subject: Re: RC4 or IBAA or ISAAC to generate large random numbers
Date: Thu, 23 Sep 1999 17:04:27 +0200
Gaston Gloesener wrote:
> The question here was. :Lets suppose that IBAA fullfills all my needs,
> does the combination really satisfies the same mathematical
> condifitions. There is a whole lot of difference to compute a large
> number or combine it from smaller ones. The most simple is the number
> themself. When algorithm A generates 8 bit numbers it will assure that
> all numbers from 0 to 255 are generated. But using to consecutive
> outputs from algorithm A an dombining them to a 16 bit value das not
> guarantee that all numbers between 0 and 65535 ! You see the answer is
> not so trivial.
You forgot a VERY important property of cryptographically secure PRNG's:
Knowing any or all previous outputs should not help you in guessing
the next output.
If a 0 followed by a 0 is less likely than a 0 followed by a !=0 (all bytes)
this property is violated because you can use your knowledge of a 0 to
predict the likelyhood of the next byte being !=0.
Since the whole concept of stream ciphers stems from that property, you might
expect that any good stream cipher is usable for your purpose.
Whether they combine bits, bytes or words into a bit stream does not matter
because of the fact that there is supposed to be NO statistical dependency between
bits. Which, of course implies no dependencies between bit sequences (i.e. words)
of any length.
The question whether you can combine bytes to words is EXACTLY the question
whether a given stream cipher is a good stream cipher.
Greetings!
Volker
--
Hi! I'm a signature virus! Copy me into your signature file to help me spread!
------------------------------
From: Jim Gillogly <[EMAIL PROTECTED]>
Subject: Re: Decryption --Help!!!
Date: Thu, 23 Sep 1999 15:04:57 +0000
[EMAIL PROTECTED] wrote:
>
> Anybody out there know where I can find a trigram-- you know a listing
> of the frequencies of three letter words in the english alphabet ENT,
> etc.
I think most trigraph tables will tell the frequency of trigraphs without
word divisions. If what you really want is the 3-letter words, here's
the top of one I produced from a bunch of Gutenberg and other online text
plus some grepping. The ordering down to about frequency 5000 should be
pretty good, and below 2000 is unreliable. I arbitrarily cut it off at
500, since anything that far down depends strongly on the sources. I
notice some bogosities in the table, like "isn" (I must have reported the
' as a word separator), bot, mai, adv and ter (no idea what brought those
up). Must be some oddity in the sample. That leads me to suggest that
you draw your own word or trigraph list from the population you're trying
to break. For example, if you're trying something from Singh's "The Code
Book", you might want to type in his previous book, "Fermat's Enigma" and
use that to beef up your frequency counts.
the 349158 and 180908 was 62484 his 49814 for 40580
you 33450 had 28259 but 27515 not 24877 her 24467
she 23135 him 21093 all 18632 one 16902 are 16769
who 11144 out 11136 man 9515 now 9499 see 8886
its 8694 has 8200 any 7330 can 7159 two 6700
may 6663 did 5913 our 5912 how 5328 day 5092
old 5028 men 4945 way 4615 don 4496 new 4403
get 3970 own 3792 say 3709 too 3529 off 3497
yet 3356 got 3202 saw 2959 why 2802 let 2745
put 2667 end 2653 mrs 2591 far 2576 god 2475
yes 2135 few 2130 bot 2102 nor 2070 set 2007
sir 1935 law 1757 air 1725 use 1699 sea 1657
war 1643 boy 1624 son 1553 non 1515 act 1487
thy 1479 sat 1415 lay 1405 red 1399 art 1299
per 1193 won 1178 hir 1148 run 1139 ten 1134
obs 1107 bed 1095 wel 1059 age 1051 sun 1048
hem 1037 big 1008 six 1005 bad 980 eye 965
low 960 tom 918 cut 913 met 898 ben 882
die 868 led 853 ran 832 mai 830 ter 795
try 779 ask 771 ago 771 pay 761 cum 756
deg 750 due 732 arm 725 sky 705 sit 679
tho 674 est 642 etc 613 iii 583 nec 571
hot 570 isn 559 qui 555 adv 546 top 545
lie 539 hat 530 bit 530 ill 529 lot 498
If you really wanted trigraphs without word divisions, here's the top of
one I have lying around; it may be from Fletcher Pratt's "Secret and
Urgent", or it may not.
the 1054 ing 317 ent 234 ion 232 tio 177
for 177 ere 162 and 154 ver 147 her 145
tha 143 ter 143 ate 139 hat 134 ati 128
ers 124 res 114 ill 110 eve 107 his 105
are 105 ted 104 con 104 red 101 all 99
nce 96 est 96 man 93 ive 90 ith 90
thi 83 rea 82 ect 81 per 79 und 78
ons 78 one 78 ess 77 wit 75 was 74
men 70 hou 70 ine 68 whi 67 sta 67
pro 67 not 67 ous 66 rom 65 ove 65
tin 64 day 64 ven 63 ore 63 ear 63
int 62 tic 61 sti 61 wer 60 tho 60
oun 60 ort 60 din 60 der 60 ave 60
ain 60 str 57 our 56 lar 56 een 56
com 56 ure 55 ica 55 ant 55 wil 54
rat 54 out 54 ich 54 but 54 any 54
nte 53 hic 53 ard 53 ame 53 pre 52
ome 52 les 52 has 52 whe 51 ide 51
ste 50 sen 50 tur 49 igh 49 enc 49
iti 48 ime 48 dis 48 art 48 hav 47
tes 46 ten 46 pla 46 ned 46 ars 46
twe 45 ree 45 rec 45 nde 45 lan 45
era 45 dre 45 tat 44 nti 44 lly 44
ity 44 end 44 lic 43 fro 43 ell 43
ble 43 min 42 lin 42 ces 42 ose 41
oll 41 ite 41 ist 41 inc 41 ght 41
att 41 act 41 wor 40 ugh 40 two 40
tte 40 tra 40 tor 40 tim 40 ran 40
--
Jim Gillogly
2 Winterfilth S.R. 1999, 14:51
12.19.6.10.0, 13 Ahau 8 Chen, Second Lord of Night
------------------------------
From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: low diffie-hellman exponent
Date: Thu, 23 Sep 1999 15:05:29 GMT
In article
<[EMAIL PROTECTED]>,
Eric Lee Green <[EMAIL PROTECTED]> wrote:
> Tom St Denis wrote:
> > > an unlicensed implementation of RC5 or RC6 (they are patented
here in
> > > the U.S., or, rather, one of the mathematical operations within
them is
>
> > Well I already have Twofish in their (along with CAST, Blowfish and
XXTEA).
> > No offense but your excuse is rather lame, do you feel that
opressed that you
> > can't download it or you just don't have the time?
>
> Both, sort of. Since I use FreeBSD as my desktop operating system
(well,
> I also dual-boot with Linux to run some apps that FreeBSD doesn't seem
> to like too much, like Quake 2), I cannot use your source directly so
it
> would be useful mostly as a framework for a quick port. Having to
> snuffle out the proprietary bits is a bit too much hassle for my
> available time. So yes, my "excuse" was rather simplified, but it all
> adds up to the same answer (shrug).
Well it's really simple to 'deactivate' cipher, you only need to
comment out two lines. The entire code however is written so if you
ditch the peekboo.c (does the startup/exit and gui) and keep the rest
you can port it simply by writing a new interface (but preferably with
the same endianess and data file format).
Tom
Sent via Deja.com http://www.deja.com/
Share what you know. Learn what you don't.
------------------------------
From: Paul Koning <[EMAIL PROTECTED]>
Subject: Re: Securing Executables
Date: Thu, 23 Sep 1999 11:52:30 -0400
Peter Johnson wrote:
>
> I'm designing a client/server application that will run in real-time.
> Assuming that the network traffic is secure by using strong encryption, a
> good random number generator for packet sequencing, compression, etc. how do
> I protect against an attack on the client executable?
>
> For example, if the attacker were running the executable in a debugger could
> he breakpoint at the point in which the data is sent and then backtrack to
> discover the plain text. Or simply search memory for the plain text (if
> known) and work from there?
>
> I've thought of some solutions:
>
> 1. Use something like SHA-1 to check the exe at load time for tampering.
> 2. Check with SHA-1 periodically as the client is running.
> 3. Can we check we're running inside a debugging environment and crash out?
> 4. Compress and encrypt local data files
None of that works, because the attacker can attack those tools first.
(Classic example: a long, long time ago someone put a back door in the
Unix login command. But the code wasn't in the login sources -- it was
in the C compiler sources. The compiler would detect that it was
compiling
the login program, and insert the back door.)
You need to do two things:
1. Keep the box physically secure -- no unauthorized people can touch it
2. Run a sufficiently secure OS. Unix flavors, carefully configured,
may be suitable. Custom kernels ditto, so dedicated networking boxes
can get this right (but they can also get it wrong...) Avoid MS
products.
paul
PS. You don't need a random number generator for sequence integrity,
a counter is enough, provided the counter is part of the data integrity
envelope. Look at IPSEC ESP (or AH).
------------------------------
From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: msg for Dave Scott
Date: Thu, 23 Sep 1999 16:07:50 GMT
In article <[EMAIL PROTECTED]>,
[EMAIL PROTECTED] (JPeschel) wrote:
> Yes, Dave claims that the chaining modes and "short key" ciphers
> are weak. It is, however, according to Dave, the NSA that can
> break these.
Oh well then. I just want to know what makes his method NSA resistant. I
figured this type of challenge would spark conversation.
> Which ciphers have you broken?
What does this have todo with anything? I didn't say 'dave break CAST' I
said dave I am using CAST (or whatever) in CBC mode, break it. He puts down
alot of good work (think of the people who made CAST, Blowfish, Twofish, RC4,
RC5, RC6 ... how they feel reading his junk posts) and I want him to justify
it.
Here is a peekboo 1.51 packet (1.51 is not out yet), Dave try reading this
message when 1.51 comes out :)
afaqaaWIALvTLPOvMoaaaaqaaaaWr3zd}EQsUXrUzGT7oFFAhaaaa
Tom
Sent via Deja.com http://www.deja.com/
Share what you know. Learn what you don't.
------------------------------
From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: some information theory (very long plus 72K attchmt)
Date: Thu, 23 Sep 1999 16:13:44 GMT
In article <7scabg$211m$[EMAIL PROTECTED]>,
[EMAIL PROTECTED] (SCOTT19U.ZIP_GUY) wrote:
> In article <[EMAIL PROTECTED]>, James Felling
><[EMAIL PROTECTED]> wrote:
> >
> ......
>
> >> The problem with non "one to
> >> one" comp is that they are weak even if the starting portion of the FILE
> >> is not KNOWN. You sir seem to think one always has the start of the
> >> file encrypted that is not necessarily true. What I showed is that non "one
> > to
> >> one" compression weakens the compression followed by encryption even if
> >> there is no information about the input file.
> >
> >Where is this demonstrated?
> >I have seen no such proof. All I have seen is you claiming that this is so.
> Will take the random file of your choice.
> pkzip ir since this is not "one to one"
> encrypt it with some AES product.
>
> Know guessing a key is slow but guess a different key.
> use the key and then try to decompress the file you got
> with the key. lots of luck. Its dam hard to even find a key
> that will lead to a decompressable file.
> Guess what knowing nothing about your file many keys
> if not most are eliminated.
>
> now do the some thine pick a random file.
> use a "one to one" compressor
> encrypt it.
> know if I guess a key I can't throw it out
> since the resulte file is decompressable.
>
> If you can't follow a simple proof like this then
> don't use compression. It would waste
> your time
What are you talking about? Ok let's examine a 64-bit block cipher for the
sake of argument.
No matter what cipher it is you have a 1/256 chance of decrypting to ASCII.
This automatically makes your chances of finding a block of text as 1/256.
Now of course for compressed data you will have other metrics but you still
will have some ratio of good to bad decrypted text.
So if I compress with DEFLATE and let's say a particular block of 8 bytes
contains 10 bytes of text, I now have a 1/1024 chance of getting ascii?
AT ANY RATE...
Compression is not to enhance the security of a system, I don't even use it
in peekboo and you can't break it or even suggest a possible break.
Compression is used to cut transmission times. Think of it. If your modem
was a 1tbps connection and you had a 50tb hd would you are to compress
anything?
Tom
Sent via Deja.com http://www.deja.com/
Share what you know. Learn what you don't.
------------------------------
From: [EMAIL PROTECTED] (Jerry Coffin)
Subject: Re: factorisation of a 2 primes(short) product
Date: Thu, 23 Sep 1999 11:41:49 -0600
In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
says...
> i try to factor numbers of 240 bits which are the product of 2 primes of
> 120 bits and i want do that with the workstations i have (several
> pentiumII/350). 2 questions:
>
> 1. is it possible ?
It should be, though for only 240 bits, using more than one machine
may be overkill.
> 2. what are the algorithms to do that ?
This is still small enough that a multiple polynomial quadratic sieve
is _probably_ still going to be faster than a number field sieve.
Probably the easiest way to handle it is to grab a copy of Miracl (for
one example) which includes (among other things) a free factoring
program as a demo. It should be able to factor a 240 bit number on
one machine in less than a day.
--
Later,
Jerry.
The Universe is a figment of its own imagination.
------------------------------
From: [EMAIL PROTECTED] (Tom Cooper)
Subject: Re: RSA weak?
Date: Thu, 23 Sep 1999 17:49:27 GMT
On Thu, 23 Sep 1999 12:27:08 +0200, "Kem" <[EMAIL PROTECTED]>
wrote:
>Hello:
>
> I am new on all this of crypt. and maybe I am going to say a crazy
>afirmation. Please, confirm me this.....
>
> RSA algorithm is based on the generation of a key thanks to two prime
>number very high. Prime numbers has the cuality of been only divisible by
>their and 1, but maybe two differents numbers (not prime) has the quality of
>generate the same key, and maybe it is possible to take adventage of this
>quality to break algorithm with "littles" changes....
> I know I am say silly afirmation, but it is only an idea. What's your
>opinion?
> Thx.
>
> P.D.: is there any good reference where RSA algorithm was explained with
>"simples" words.
>
If a number is a product of two primes then this is the only
(non-trivial) way that it can be expressed as a product. This is a
consequence of the unique factorization theorem for integers.
It follows that there is no useful choice of non-prime numbers that
generate the original key in the same way. Tom.
------------------------------
From: "Douglas A. Gwyn" <[EMAIL PROTECTED]>
Subject: Re: frequency of prime numbers?
Date: Thu, 23 Sep 1999 17:07:30 GMT
"Trevor Jackson, III" wrote:
> Douglas A. Gwyn wrote:
> > Donald Welsh wrote:
> > > I'd like to correct this misconception, if I may. Godel's theorem
> > > does not say that "there are true statements that cannot be proved".
> > > It says that there are unprovable statements. These statements are
> > > neither true nor false.
> > False unprovable statements are trivial. Goedel's result
> > pertains to statements that are true, yet unprovable within
> > the given axiomatic system.
> Really. Do you have a trivial solution to the (false) statement "Turing
> machine N halts?"
What do you mean, "solution"? What is the *problem*?
Obviously, if the axiomatic system is consistent,
it cannot be used to prove any false statement,
so all the false statements are unprovable.
If the axiomatic system is rich enough to express
the exact statement about Turing machine N, and
that statement is false (which you *stipulate*),
then so long as the system is consistent it cannot
be used to prove that statement. And inconsistent
axiomatic systems are rather uninteresting.
------------------------------
From: [EMAIL PROTECTED]
Crossposted-To:
alt.security.pgp,comp.security.pgp.discuss,talk.politics.crypto,uk.legal,uk.net,uk.politics.announce,uk.politics.censorship,uk.politics.parliament,uk.telecom
Subject: UPDATE: 23rd Sep, UK Internet decryption and interception policy, SFS3.5
Date: Thu, 23 Sep 1999 17:56:59 +0000
Reply-To: "No Spam" <[EMAIL PROTECTED]>
PROGRAMME UPDATE - http://www.fipr.org/sfs35.html
Scrambling for Safety 3.5 - Thursday September 23 1999
======================================================
The Foundation for Information Policy Research, Privacy International , the
LSE Computer Security Research Centre, and ZDNet UK are jointly sponsoring
the fourth in the series of public conferences on cryptography policy,
e-commerce and Internet surveillance. This will be the second conference of
1999, and has been called in response to the exceptional circumstance of two
official DTI consultations in the same year, and the Home Office's recent
consultation on revising the Interception of Communications Act to cover the
Internet.
The connections between Home Office policy on interception and powers
proposed in Part.III of the DTI's draft Electronic Communications Bill (see
FIPR Press Release) will be explored, and well as the legal framework for
establishing voluntary licensing of cryptography services, and recognition
of digital signatures.
09:15 - 13:45, Thursday 23 September 1999
Old Theatre, Main Building, London School of Economics,
Houghton St., London WC2
Admission is free of charge.
Registration: Send e-mail to
[EMAIL PROTECTED]
...with "name, organisation" in body.
Telephone enquiries: 0171 354 2333
Programme
=========
09.25 Welcome - Caspar Bowden, FIPR
09:30 Introduction - William Heath (Kable)
Tim Pearson (Internet Service Providers Association)
Chris Binns, Alliance for Electronic Business: "Progress towards
self-regulation"
10:00 "Cryptography, privacy and information warfare"
Whitfield Diffie
10:30 "Why we needed further consultation"
Alan Duncan MP, Shadow spokesman on Trade and Industry
11:00 "Cryptography's central role in e-commerce policy"
Chris Sundt, CBI
11:30 "Law enforcement access to keys - legal and human rights issues"
Nicholas Bohm (Law Society)
12:00 "Crypto and security issues post-escrow"
Ross Anderson
12:15 Keynote:
Patricia Hewitt MP - Minister of State for E-Commerce at the DTI
12:35 Panel discussion - Chaired by Caspar Bowden, Director of FIPR
Jim Norton (Cabinet Office PIU)
Stephen Pride (DTI, Head of E-Communications Bill team)
Peter Sommer (Special Adviser, Trade and Industry Select Committee)
Clare Wardle (Post Office)
John Wadham (LIBERTY)
Jack Beatson QC, (Essex Court Chambers)
Stewart Baker (Steptoe & Johnson, ex-NSA General Counsel)
13:30 - close
+=======================================================================+
| Ivor Peksa - Co-moderator - uk.politics.announce |
| Submissions to: [EMAIL PROTECTED] |
| Guidelines at : http://www.club.demon.co.uk/U-p-announce/index.html |
+=======================================================================+
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and sci.crypt) via:
Internet: [EMAIL PROTECTED]
End of Cryptography-Digest Digest
******************************