Cryptography-Digest Digest #592, Volume #11 Fri, 21 Apr 00 05:13:01 EDT
Contents:
Re: OAP-L3: Semester 1 / Class #1 All are invited. (Anthony Stephen Szopa)
Re: OAP-L3: Semester 1 / Class #1 All are invited. ("Trevor L. Jackson, III")
Re: Inverse of Permutation polynomials (Diet NSA)
Re: OAP-L3: Semester 1 / Class #1 All are invited. (Anthony Stephen Szopa)
New version of MIRACL ("Dann Corbit")
Re: OAP-L3: Semester 1 / Class #1 All are invited. (Anthony Stephen Szopa)
SSL and "man in the middle" attack (Francois Grieu)
Re: SSL and "man in the middle" attack ("Lyalc")
----------------------------------------------------------------------------
From: Anthony Stephen Szopa <[EMAIL PROTECTED]>
Crossposted-To: talk.politics.crypto
Subject: Re: OAP-L3: Semester 1 / Class #1 All are invited.
Date: Fri, 21 Apr 2000 00:07:34 -0700
Joseph Ashwood wrote:
>
> > You obviously don't have a clue what a table is for or
> what you are
> > looking for in this table or what you need to reply to let
> me know
> > that you "get it."
>
> Here's another table:
> 59 6f 75 27 72 65 20 61 20 66 75 63 6b 69 6e 67 20 61 73 73
> 68 6f 6c 2c 20 61 6e 64 20 79 6f 75 20 63 61 6e 20 74 61 6b
> 65 20 79 6f 75 72 20 61 62 73 6f 6c 75 74 65 20 6c 6f 73 65
> 72 20 61 6e 20 64 6e 63 72 79 70 74 69 6f 6e 20 61 6c 67 6f
> 72 69 74 68 6d 20 61 6e 64 20 73 68 6f 76 65 20 69 74 20 77
> 68 65 72 65 20 74 68 65 20 73 75 6e 20 64 6f 6e 27 74 20 73
> 68 69 6e 65
>
> And I think it's pretty clear about what you are to do with
> it.
>
> > Also note that you have misrepresented the random number
> generator
> > when you say the random digit generator in OAP-L3 is not
> > cryptologically secure.
>
> You have never established that your algorithm is
> cryptologically secure, it's probably a safe assumption that
> it's not cryptologically secure.
>
> >
> > You have chosen one part of the random number generator
> and made
> > this claim. The entire random number generator process
> results
> > in the random numbers contained in the OTPs, and not the
> random
> > digits from the MixFile process you address.
>
> If one part of the pRNG is insecure the entire thing is
> insecure (see complaints about original MARS key schedule).
>
> > There is only one legitimate test for determining the
> security of
> > encryption software: this test is that the cracker needs
> to know
> > all about the encryption software's inner workings, the
> cracker
> > needs to have a substantial amount of plain text, and the
> > corresponding encrypted text. From this knowledge and
> this
> > information the cracker must crack all encrypted messages.
>
> No that is not the only legitimate test, if the security of
> your pRNG has been successfully compromised without access
> to much of the information that you have not released, then
> it has been compromised.
>
> >
> > You are only asking essentially for the key to the MixFile
> / random
> > digit process and then trying to predict subsequent random
> digits.
>
> Which of course may be enough to compromise the fake
> security of your system
>
> >
> > You want this key (once removed) and expect someone to
> believe you
> > have cracked this process then you leap to the conclusion
> that the
> > entire random number generator / generation is flawed.
>
> If you don't think he can do it, give him what he asks for.
> Joe
I make a convincing logical argument in the Theory Help File why
there is no introduced bias when the software is used according to
recommendations. I make a convincing logical case why the output
is random. And I make a convincing logical case why the software
is practicably unbreakable with a sufficiently long key.
You say I haven't.
Then I say you haven't read the Help Files adequately.
If and when you read the Help Files adequately it should certainly
be easy for you to follow my arguments and point out where they are
incorrect.
If you don't understand the arguments then let me know the very
first exact sentence you don't understand, and what the nature of
your confusion is. Then we'll take it from there. I await your
pleasure.
Yes, you are right. If someone looks into your computer and gets
the key or part of it, well, I guess your encryption is certainly
compromised. You are a shining light of brilliance on this point.
The art of innuendo is amusing but not convincing.
Your position is that if I provide the key then my software is
compromised? I have no argument with that.
Tell us how you would break OAP-L3 encrypted messages.
Changing the subject:
Since I am taking the time, let me tell you how amused I was when
someone said that there are no papers written on OAP-L3 and that I
am something or other to suppose there were.
Who do you think monitors this news group and associated news groups
on encryption? All intelligence organizations worth their salt from
around the world. Also, very smart corporations. Also, competing
encryption product producers. Also, academicians involved in
encryption and mathematics. Basically, any and all those whose
business it is to know: all those in the business of knowing:
the knowledge business people. The people who are always looking,
listening, analyzing, thinking, planning. The people who really
know how to have fun.
Many of them are located in good ol' Virginia. I ought to know,
my web stats show the most organizations and the heaviest traffic
from there. Now who could they all be in good ol' Virginia?
I know who I am talking to. Many of you don't even know who is
listening.
This is why I am not wasting my time in this news group. I am
playing through most of you and addressing them.
I like them. I like them all. For better or worse.
Maybe I will tell you why some day.
------------------------------
Date: Fri, 21 Apr 2000 03:28:43 -0400
From: "Trevor L. Jackson, III" <[EMAIL PROTECTED]>
Crossposted-To: talk.politics.crypto
Subject: Re: OAP-L3: Semester 1 / Class #1 All are invited.
Anthony Stephen Szopa wrote:
> "Douglas A. Gwyn" wrote:
> >
> > Anthony Stephen Szopa wrote:
> > > This is all so richly comical.
> >
> > That's because instead of conducting a technical dialogue,
> > you're just insisting that you're right and everybody else
> > is intellectually dishonest. And instead of explaining
> > the principles in terms that would make sense to a working
> > cryptologist, you simply direct us to figure it out
> > ourselves from the "help files". How about treating this
> > as a genuine technical discussion? For example, tell me
> > why my observation (based on examining the "help files")
> > that at least one of the three columns of generated "mix"
> > could be recovered by chaining is flawed (as you claimed).
> > I suspect that most cryptologists will have no real
> > interest in your system if their concerns are not addressed
> > in good faith.
>
> Real cryptologists understand my Help Files.
Excellent. Now we are making progress. Please name at least two "real
cryptologists" who understand your Help Files.
------------------------------
Subject: Re: Inverse of Permutation polynomials
From: Diet NSA <[EMAIL PROTECTED]>
Date: Thu, 20 Apr 2000 09:23:53 -0700
In article <8djg3j$gp9$[EMAIL PROTECTED]>
, [EMAIL PROTECTED] wrote:
>Reading all the messages from Tom about permutation polynomials
mod
>(2^w), I couldn't help but get interested in the subject.
I too became interested & looked for more
info on perm. polys. There are quite a few
papers written on crypto applications of
perm. polys., but I don't know what they
are because it would have taken me too
long to actually track down these papers.
Dan Ashlock gave a talk called "Matrix
permutation polynomials over the
integers (mod n)". I wonder what matrix
permutation polynomials are? (I suppose
someone could email Mr. Ashlock).
"I feel like there's a constant Cuban Missile Crisis in my pants."
- President Clinton commenting on the Elian Gonzalez situation
=======================================================================
* Sent from RemarQ http://www.remarq.com The Internet's Discussion Network *
The fastest and easiest way to search and participate in Usenet - Free!
------------------------------
From: Anthony Stephen Szopa <[EMAIL PROTECTED]>
Crossposted-To: talk.politics.crypto
Subject: Re: OAP-L3: Semester 1 / Class #1 All are invited.
Date: Fri, 21 Apr 2000 01:31:54 -0700
James Felling wrote:
>
> > <giant snip>
> >
> > I will prove you do not know what you are talking about by you
> > simply answering this question:
> >
> > The OAP-L3 encryption software uses a random number generator.
> > Now which of the following is the most correct and most
> > comprehensive description of this random number generator that
> > it uses: which is the description that results in the random
> > numbers used in the encryption process?
>
> >
> > 1) The process that outputs the random digits from the MixFiles, or
> >
> > 2) the process that results in the OTP files?
>
> Well the best way to answer that is "neither"( or "both" -- depends upon how I look
>at it). I
> agree that the stream data is generated primarially by process #2. However it
>still uses
> data from process #1 to produce the mix files which are then used by process #2. If
>one
> examines the crypto literature you will find many algorithims that have comentaries
>by skilled
> people along the line of "this section of the algorithim is weak -- it does not do X
>properly
> -- I have found no attack to exploit this property" and this is enough to withdraw
>the
> algorithim from serious consideration. Why should your program be judged upon a
>different
> standard?
>
> >
> >
> > Now define precisely what your supposed flaws are and what is the
> > exact nature of these "artifacts" you allege?
>
> Ok since you have obviously not done even a textbook analisys of your mix file
>generation
> process I will.
> I am using your own names for the subprocesses.(P.S. this is not an exhaustive list
>of what I
> have found, but it is simply the result of a half hour of simple kindergarten
>cryptoanalisys)
>
> We start with a file F of all possible 1 to 10 sequences.I shall number them
>F(1),F(2),
> ....,F(10!)
>
> 1) Scramble -- since all other mixing ops are external( they affect the order in
>which the
> F(i)'s are presented) Scramble is effectively orthogonal to all other MixFile
>creation
> steps.This means we can effectivly treat all other steps as modifying the set S=
> Scramble(F(1)), Scramble(F(2)), ....., Scramble(F(10!))
>
> 2) Mix -- The "Mix" operation doesn't do a very good job of it. M(i)= the ith
>sequence of
> Mix(S) has the following properties M(j+105*n)= S(j+105*n) with probability . (n>=0,
>and j=
> first mix value). Since there are further steps this is less bad than it seems.
>
> 3) Redistribute -- This creates 14 files I will denote them as T(1) to T(14), and
>then T(k,m)
> = themth member of Tfilek.
> This is aparently accomplished as follows T(k,m)= M( (k-1)*259200 + m ).
>
> 4) Shuffle. This Permutes the Tfiles, then data are taken from them in the permuted
>order to
> generate the mixfile.call this permutation p(x).
>
> Attack vs mix file generation.
>
> Sincej>=1, T(1,1)= Scramble(F(1)) , and T(8,1)=Scramble(F(1814401)) this meand
>that within
> the first 14 sequences in the Mix files we have two sequences that are known, this
>will occur
> regularly within the mix file where within 14 digits at easily computable points in
>the file 2
> sequences (Scrambled) with known chjaracter exist. Because of this we have very good
>odds of
> recovering both scramble, and some very good information on P(x) in addition.
>Further, if
> j>1 we will easily recover scramble as T(1,2) will occur 14 spots later in the file
>and will
> be a single rearangement swap different from T(1,1)
> .
>
> As you can see the Mixfile.otp has a significant amount of exploitable structure --
>enough to
> allow recovery of its generating keys in comparitively short order. Since this is
>the case,
> it seems likely to me that at least some of this structure could be exploited by an
>analyst
> working the whole key backward.
>
> >
> >
> > Let me end with this:
> >
> > The accepted test of the security of an encryption process is not
> > what Mr. Huuskonen has asked for. The accepted test is that it is
> > assumed that the cracker knows every thing there is to know about
> > the algorithm, and that the cracker has a substantial amount of
> > plain text and the corresponding encrypted text. From this
> > it is demanded that the cracker use this information and knowledge
> > to crack the software. This is hardly what Mr. Huuskonen is asking
> > for: he is essentially asking for the key once removed.
>
> Yes, to a degree he is. But the same structures that allow him to attack your mix
>file will
> exist, to a lesser degree in the final output. My guess is that the Mix files
>provide about
> 20-30 bits of randomness per each(assuming my attack cannot be refined). This puts
>the
> randomness of your code somewhere in the neigborhood of a 90 to 100 bits( tops) when
>you
> factor it all in. I will be generous and say you are as secure as 3DES(112 bits).
>Why should
> we use your code in prefrence to 3DES?
This is nothing but BS and I think you know it.
Let's keep it simple then build from there.
Let's say we start with the original encryption data file: the
3,628,800 ten-digit permutations consisting of the digits 0 - 9
with no repeats. In this original encryption file the permutations
are arranged in ascending order.
Let's just run the Shuffle process once. The first 259,200 arrays
are read from the original encryption data file and written to
TFile1. The next 259,200 arrays are read and written to TFile2.
The next 259,200 arrays are read and written to TFile3, etc. until
there are TFile1 - TFile14.
The user then inputs a true random 14 number sequence of the
numbers 1 - 14 with no repeats. For your information there are
14! = over 87 billion possible unique sequences of the numbers
1 - 14.
Then these 14 TFiles are interleaved one array at a time according
to this 14 number sequence.
The resulting output file, we'll call it, MixFile1, is one of over
87 billion possible.
You say it will be easy to guess the order of the permutations in
this MixFile1? How will you do it? There is only one way to do
it: trial and error by using all the 87 billion 14 number
sequences. (Because the input was true random you cannot get around
this by any other means.)
So, after you have produced each of these over 87 billion possible
MixFile1's you store them confident that you have certainly produced
the correct MixFile1 among the over 87 billion you have generated and
stored.
Okay.
Now let us run the Shuffle process again on MixFile1 using another
true random 14 number sequence of the numbers 1 - 14 with no repeats
and call the output again, MixFile1. As above, there are over 87
billion possible sequences.
But there are now over (87E9)^2 possible 28 number sequences of two
sequences of 14 numbers 1 - 14 in a row.
So now you have to produce and store over (87E9)^2 MixFile1's but
you can still be certain that at least one of these (87E9)^2
MixFile1's is the correct one.
Let's say I repeat the process 50 times in total. This means that I
have shuffled the original encryption data file 50 times using one
of over 87 billion 14 number sequences with each shuffle. Thus the
total user input is 50 true random 14 number sequences of the numbers
1 - 14.
This means that there are over (87E9)^50 possible 50 true random 14
number sequence sequences in a row and that the actual input used is
only one of these over (87E9)^50 sequences.
For you to determine the final MixFile array sequence after 50 runs
of the Shuffle process with absolute certainty that at least one of
the MixFiles is the actual one, you will have to produce over
(87E9)^50 MixFiles, and store them.
Let's see, if each MixFile is over 18MB you will need enough storage
for 18E6 * (87E9)^50 = 1.5E459 bytes.
But you can at least be sure you have the right sequence somewhere
among them all.
Your problem now is: which one is it?
Let's say you need three such MixFiles and that the user uses their
last MixFile1 after 50 Shuffle runs to begin 50 more shuffle
processes to produce a MixFile2, then run 50 more processes on this
last MixFile2 to produce a MixFile3.
Similarly as shown in the Theory and Processes Help Files, the odds
of duplicating MixFile1 with certainty is one in (87E9)^50.
But for duplicating MixFile2 it is one in ((87E9)^50)^2 = (87E9)^100.
For duplicating MixFile3 it is one in ((87E9)^50)^3) = (87E9)^150.
And finally, to guess with certainty, all three MixFiles it would be
(87E9)^50 * (87E9)^100 * (87E9)^150 = (87E9)^300.
Tell us how you are going to guess the one chance in (87E9)^300 of
getting the correct three exact MixFiles? (Not to mention store all
of them.)
We really want to know?
Give up?
Give up.
And we haven't even considered subsequent processing of the random
binary number files produced from the MixFiles.
Now, what is it you don't understand about unbreakable?
(I bet you would you like me to sneak you the key right about
now, eh?)
See, how plain it is in layman's terms. This is why I say that the
entire software package is understandable by anyone with average
intelligence.
Now what exactly don't you understand?
(And whatever it is you'd like to say can you say it in laymen's terms
so everyone can understand you?)
Thank you.
(All of this is just as simply explained in the Help Files at
http://www.ciphile.com)
------------------------------
From: "Dann Corbit" <[EMAIL PROTECTED]>
Subject: New version of MIRACL
Date: Fri, 21 Apr 2000 01:38:44 -0700
One of my favorite toys just got updated:
http://indigo.ie/~mscott/
Definitely worth a look.
;-)
--
C-FAQ: http://www.eskimo.com/~scs/C-faq/top.html
"The C-FAQ Book" ISBN 0-201-84519-9
C.A.P. Newsgroup http://www.dejanews.com/~c_a_p
C.A.P. FAQ: ftp://38.168.214.175/pub/Chess%20Analysis%20Project%20FAQ.htm
------------------------------
From: Anthony Stephen Szopa <[EMAIL PROTECTED]>
Crossposted-To: talk.politics.crypto
Subject: Re: OAP-L3: Semester 1 / Class #1 All are invited.
Date: Fri, 21 Apr 2000 01:34:34 -0700
Taneli Huuskonen wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> In <[EMAIL PROTECTED]> Anthony Stephen Szopa
> <[EMAIL PROTECTED]> writes:
>
> [...]
> >Table 1 -
>
> >Usg IIP MixFile1 MixFile2 MixFile3 Digit
> >5 8 6327491805 5382460791 1352094678 9
> >1 3 7246301598 6153704298 7801354926 3
> >6 5 7845069213 4019682573 2184065379 4
> >2 9 1904735268 4273860915 8670159423 7
> >4 1 0819374256 6421935087 9710324865 9
> >3 7 3145682790 8601534279 8523419670 4
> >1 2 1495638027 4139708562 8642375190 4
> >4 0 6712958403 9152743860 7618943205 5
> >6 4 1093865724 6491830725 2705941368 6
> >2 6 8610273495 3091268475 1846327095 8
> >5 8 7568421390 6729480531 0876925413 8
> >3 1 9310845672 0567483192 0835974162 9
>
> >Usg = usage
> >IIP = initial index pointer
>
> Usg IIP MixFile1 MixFile2 MixFile3 Digit
> 1 8 6327491805 5382460791 1352094678 9
> 2 3 7246301598 6153704298 7801354926 7
> 3 5 7845069213 4019682573 2184065379 1
> 4 9 1904735268 4273860915 8670159423 3
> 5 1 0819374256 6421935087 9710324865 0
> 6 7 3145682790 8601534279 8523419670 6
>
> Taneli Huuskonen
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGPfreeware 5.0i for non-commercial use
> Charset: noconv
>
> iQA/AwUBOP7aE1+t0CYLfLaVEQIHUwCfVX4MwuwPnlYto8AJW4iZYItupEIAniEv
> BsuX8t0/6YeuufEKHuaOytQ1
> =3O5z
> -----END PGP SIGNATURE-----
> --
> I don't | All messages will be PGP signed, | Fight for your right to
> speak for | encrypted mail preferred. Keys: | use sealed envelopes.
> the Uni. | http://www.helsinki.fi/~huuskone/ | http://www.gilc.org/
You obviously don't have a clue what a table is for or what you are
looking for in this table or what you need to reply to let me know
that you "get it."
When I release OAP-L3 Version 4.3 I will make available the paper I
wrote explaining the fundamentals upon which Version 5.0 will be
based. This table will be included, of course.
Also note that you have misrepresented the random number generator
when you say the random digit generator in OAP-L3 is not
cryptologically secure.
You have chosen one part of the random number generator and made
this claim. The entire random number generator process results
in the random numbers contained in the OTPs, and not the random
digits from the MixFile process you address.
I entertained you when you suggested that you could predict
subsequent digits from the MixFile process you referred to to
see where it would lead.
Your requirements to do this only prove that the entire random number
generator process IS secure and here is why.
There is only one legitimate test for determining the security of
encryption software: this test is that the cracker needs to know
all about the encryption software's inner workings, the cracker
needs to have a substantial amount of plain text, and the
corresponding encrypted text. From this knowledge and this
information the cracker must crack all encrypted messages.
You are only asking essentially for the key to the MixFile / random
digit process and then trying to predict subsequent random digits.
You want this key (once removed) and expect someone to believe you
have cracked this process then you leap to the conclusion that the
entire random number generator / generation is flawed.
You are not in my kill file but I will only reply to honest and
intelligent posts from you in the future.
------------------------------
From: Francois Grieu <[EMAIL PROTECTED]>
Subject: SSL and "man in the middle" attack
Date: Fri, 21 Apr 2000 10:39:59 +0200
I am looking for references on the security of the SSL protocol against
the "man in the middle" attack (*) in the context of online commerce
using credit card info keyed-in by the customer.
I have heard conflicting reports, ranging from
1) SSL offers no protection against the man in the middle attack
2) a man in the middle attack can be mounted simply with knowledge of
the secret key and certified public key of any SSL server, which is
readily available to hackers; and there is no infrastructure in the
leading browsers to revoke server public key certificates [variants: no
workable/working infrastructure]
3) all browsers check the domain name in the server's certificate
matches the actual domain name reported by the DNS system, so the
attacker needs to attack the DNS protocol as well; this limits the
attack to a location close (in the network sense) to the end user.
4) and this will work only if the user does not check the server
identification info, which the leading browsers display clearly.
5) SSL is safe (source: sites using SSL :-)
Any serious study out there ?
Comments and pointers welcome.
Francois Grieu
(*) where an attacker can alter the information exchanged on the network
------------------------------
From: "Lyalc" <[EMAIL PROTECTED]>
Subject: Re: SSL and "man in the middle" attack
Date: Fri, 21 Apr 2000 18:49:32 +1000
See:
Web Spoofing: An Internet Con Game
Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach
Technical Report 540�96 (revised Feb. 1997)
Also, there is another atttack source to add to your list:
- Modifying a hyperlink on valid web page to point to the wrong SSL address.
A subtle form defacement.
Lyal
Francois Grieu wrote in message ...
>I am looking for references on the security of the SSL protocol against
>the "man in the middle" attack (*) in the context of online commerce
>using credit card info keyed-in by the customer.
>
>I have heard conflicting reports, ranging from
>
>1) SSL offers no protection against the man in the middle attack
>
>2) a man in the middle attack can be mounted simply with knowledge of
>the secret key and certified public key of any SSL server, which is
>readily available to hackers; and there is no infrastructure in the
>leading browsers to revoke server public key certificates [variants: no
>workable/working infrastructure]
>
>3) all browsers check the domain name in the server's certificate
>matches the actual domain name reported by the DNS system, so the
>attacker needs to attack the DNS protocol as well; this limits the
>attack to a location close (in the network sense) to the end user.
>
>4) and this will work only if the user does not check the server
>identification info, which the leading browsers display clearly.
>
>5) SSL is safe (source: sites using SSL :-)
>
>
>Any serious study out there ?
>Comments and pointers welcome.
>
>
> Francois Grieu
>
>
>(*) where an attacker can alter the information exchanged on the network
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and sci.crypt) via:
Internet: [EMAIL PROTECTED]
End of Cryptography-Digest Digest
******************************