Cryptography-Digest Digest #239, Volume #12      Mon, 17 Jul 00 17:13:01 EDT

Contents:
  Re: RC4-- repetition length? (Guy Macon)
  Re: DOS vs DOS (was Re: SECURITY CLEAN...) _long_ ([EMAIL PROTECTED])
  Re: Carnivore and Man-in-the-middle ([EMAIL PROTECTED])
  Info about non-repudiation as it relates to cryptographic mathematics 
([EMAIL PROTECTED])
  Re: DOS vs DOS (was Re: SECURITY CLEAN...) _long_ (Benjamin Goldberg)
  MD2 (Daniel Leonard)

----------------------------------------------------------------------------

From: [EMAIL PROTECTED] (Guy Macon)
Subject: Re: RC4-- repetition length?
Date: 16 Jul 2000 19:36:08 EDT

Rex Stewart wrote:
>
>
>In article <8kj04a$bd4$[EMAIL PROTECTED]>,
>  [EMAIL PROTECTED] wrote:
>> In article <[EMAIL PROTECTED]>,
>>   John Myre <[EMAIL PROTECTED]> wrote:
>> > Bill Unruh wrote:
>> > <snip>
>> > >
><<cut>>
>>
>> I did some analysis a few years ago because RC4 resembled a
>> generator I had developed independently.  Here's the analysis:
>>
>>   http://burtleburtle.net/bob/rand/isaac.html
>>
><<cut>>
>>
>> - Bob Jenkins
>
>As I was looking at the above paper, I realised it said the
>method of keying prevented landing in a short cycle. I was
>wandering if the keying method in Ciphersabre 2 might be
>problematic since it uses the same keying method, but does
>not stop in the same place.

Source: http://ciphersaber.gurus.com/cryptanalysis.html

A Cryptanalysis of CipherSaber-1

CipherSaber 1 is a way of using Ron Rivest's RC4 cipher as a practical 
symmetric key cryptosystem. It is intended to demonstrate that strong 
cryptography can be very simple to implement, and therefor impossible 
to suppress without massive infringement on civil liberties. A 
CipherSaber-1 program can be written in 16 lines of QBasic. CipherSaber 
is explained more fully at http://ciphersaber.gurus.com.

In CipherSaber-1, the ASCII representation of the user key or passphrase 
is used directly as part of the RC4 key. To prevent the same RC4 key 
from being used twice, a ten byte initialization vector (IV) is appended 
to the user key to form the complete RC4 key. The IV is stored as the 
first ten bytes of CipherSaber-1 encoded files.

This paper presents and analysis of several potential weaknesses in 
CipherSaber-1 and recommendations for avoiding them. We use the same 
notation here that Bruce Schneier uses in his description of RC4 in 
the second edition of his Applied Cryptography, except that the stream 
of cipher bytes that RC4 produces are denoted as C(i).

1. Key Size
In most cryptosystems, the longer the key, the better. However, it was 
pointed out by several individuals who looked at CipherSaber-1 that a 
very long user key could prevent the IV from affecting more than a few 
of the S(i) values. This could cause leakage of plaintext. To insure 
adequate mixing, we advised users to restrict their user key length to 
54 characters or less, as most would anyway. This insures that the IV 
will be mixed in at least four times during the setup process. Here 
is a more detailed justification of the 54 character limit.

We want to estimate the likelihood that initial cipher bytes will be 
unaffected by the IV. Assume a user key length of 54 bytes, the maximum 
length we recommend. Then all the S(i) after the first 54 will be 
affected by the IV during key setup. S(0) through S(53) will only be 
affected by the IV if they are swapped in key setup rounds 55 through 
256. That means there 202 opportunities. The probability that a given 
S(i) will remain unswapped is

(255/256)**202 = 0.45.

So the expected number of the first 54 S(i) that are unaffected is 
54*0.45 = 24.5. Thus the probability that S(i), where i is selected 
at random from [0,256], has not been affected by the IV is 
24.5/256 = 0.096

We can calculate the values that the first few S(i) are likely be have 
after the key setup is complete if we assume that none of the first few 
swaps hit an S(i) that has already been swapped previously. Recall that 
at the start of key setup, S(i) = i, for all i.

Then:

S(0) = K(0)

S(1) = K(0)+K(1)+1

S(2) = K(0)+K(1)+K(2)+3

...

Call the successive cipher stream bytes C(i). If the first few S(i) are 
not affected during the production of the first few cipher bytes, then:

C(0) = S(S(1) + S(S(1)))

C(1) = S(S(2) + S(S(1)+S(2)))

C(2) = S(S(3) + S(S(1)+S(2)+S(3)))

...

C(i) = S(S(i+1) + S(x)), where x = S(1)+S(2)+...+S(i+1) mod 256 

Each S(i) for i between 0 and 53 have a 0.45 chance of being unaffected by 
the IV. Therefore x has a 0.45**(i+1) chance of being unaffected.

The values S(x) and S(S(i+1)+S(x)) each have a .096 chance of being 
unaffected. Therefore C(i) has a chance p(i) of being unaffected by the 
IV, where

p(i) =0 .096*0.096*0.45**(i+1) = 0.0092*0.45**(i+1) 

     i  1/p(i)
 
     0  242
     1  539
     2  1198
     3  2662
1.1 C(0) Analysis
The most vulnerable Cipher byte would appear to be C(0). However assume 
further that the first two characters of the user key are 7-bit ASCII 
and donot contain control characters. Thus they are in the range [20, 7E] 
hex, i.e. [32, 126] decimal.

Recall that S(1) = K(0)+K(1)+1 and therefore is in the range [65-253].

Also remember that: C(0) = S(S(1) + S(S(1)))

We see that the S(S(1)) term is guaranteed to select an S value that was 
affected by the IV. So if the first two characters of the user key are 
7-bit ASCII, C(0) will always be afffeced by the IV. 

1.2 C(1) Analysis
Based on the above analysis, C(1) now appears to be the most vulnerable 
cipher byte.

Remember that C(1) = S(S(2) + S(S(1)+S(2))) and S(1) = K(0)+K(1)+1 

If K(0) and K(1) are in the range [27, 100] decimal, then S(1) must be 
in the range [55, 201] decimal. This means that S(2) and S(1)+S(2) cannot 
both be in the range [0, 53] and C(1) is guaranteed to be affected by 
the IV. The condition that K(0) and K(1) are in the range [27, 100] 
decimal, which is [1B, 64] hex, is satisfied if the first two characters 
in the key are digits or uppercase characters. So if the first two 
characters of the user key are digits or uppercase characters, C(1) will 
always be afffeced by the IV. Given that the chance of C(1) being 
unaffected by the IV is 1/539 which is less than the likelihood of any 
random 8-bit value (1/256), we have not recommended that users restrict 
the first two characters of their key to digits or uppercase.

1.3 Effect of Varying Key Size
For a 41 byte key (the size that insures 5 mixings), the C(1) unaffected 
probability is computed as follows. The probability that one of the first 
41 S(i) being unaffected by the IV is

(255/256)**(256-41)=.43

Probability of a random S(i) being unaffected is 0.43*41/256 = 0.069.

Probability p(1) of C(1) being unaffected is (0.43*0.069)**2 = 1/1134. 
This is much less than the 1/256 likelihood of a random 8-bit value.

For a 74 byte key (the size that insures 3 mixings), the probability 
p(1) that C(1) is unaffected by the IV is as follows. 

The probability that one of the first 74 S(i) being unaffected by the 
IV is:

(255/256)**(256-74) = 0.49

Probability of a random S(i) being unaffected is 0.49*74/256 = .141

Probability of C(1) being unaffected is (0.49*0.141)**2 = 1/209. This 
is greater than the 1/256 likelihood of a random 8-bit value, justifying 
our recommendation not to use a key this big.

2. Weak Keys
On September 22, 1995, Andrew Roos posted a paper to sci.crypt.research 
that presented a class of weak keys in RC4. The conditions for this 
class are

K(0) + K(1) = 0 mod 256.

These weak keys can leak information about the first byte of the key or 
cipher stream.

Note that if the K(0) and K(1) are 7-bit ASCII characters at least one of 
which is not NUL (00), the above condition is never satisfied. Thus the 
use of printable 7-bit ASCII keys avoids this class of weak keys.

Several people have asked why the IV isn't prepended to the user key. 
Doing so could permit weak keys to occur.

3. IV Size and Randomness
RC4 is a stream cipher. That means RC4 produces a stream of bits that are 
xor'ed with the bits in the message. In a stream cipher it is essential 
that the same key never be used twice.

If Sam the skilled snoop ever encounters two different messages encrypted
with the same RC4 key, then Sam can xor their cipher text to eliminate 
the RC4 cipher bits because xor repeated twice is a null operation. Sam 
will then have a stream of bits that represent the xor of the plaintext 
of the two messages. If Sam knows the plaintext of one of the messages, 
he can easily recover the other. Worse, if the messages are in a natural 
language such as English, he can usually recover both messages -- even 
if he knew neither. While revelation of encoded messages is bad news for 
any cipher, in neither case is Sam able to recover the user key.

CipherSaber addresses the requirement that the same key never be used 
twice by appending a ten byte quantity, called the initialization vector 
(IV), to the users key. If the same IV is never used twice then the same 
RC4 key can never be used twice.

The IV values can be any unique 8-bit quantities. For example, one could 
use the year, month, day, hour minute second and hundredth of a second. 
As long as no two messages were sent at exactly the same time, you would 
be safe.

Another way to get a high likelihood of uniqueness is to use random values 
for the IV bytes. This also makes encrypted file look like totally random 
byte strings, which may be useful in some cases. 

Since there are 80 bits in the IV, if n messages have been encoded with 
the same user key, the probability q(n) that two messages will have the 
same IV is

q(n) = n(n-1)/(2**80)

Even if one generated a billion messages, the probability that two 
messages have the same IV is about one in a million. There is, however 
a big "but" as we see in the next section.

3.1 Use of Built-in Random Number Generators to Create the IV. 
The "but" is that we are assuming all the IV bytes are random. Creating 
random values on a computer can be tricky, In particular, the built-in 
random number generators supplied in most programming environments are 
notoriously bad.

Most C programming environments offer a 32 bit random number generator. 
If such a generator is used to create an 80-bit IV there is still at 
most only 32 bits of randomness. The probability q(n) that two messages
 will have the same IV is then

q(n) = n(n-1)/(2**32)

If you want q(n) to be less than one in a thousand, you can only send 
about 2000 messages with the same user key. To achieve even this level
of safety, you need to initialize the random number generator with a 
seed that has 32 bits of randomness.

3.2 Problems with QBasic as a Source of IV Randomness
A more extreme example is Microsoft's QBasic 4.5. This Basic interpreter 
is shipped ont the CD-ROM that comes with every copy of Windows '95, 
making it undoubtedly the most widely distributed programming environment 
in the world. QBasic is very well suited for implementing RC4. It even has
a SWAP statement. However, its random number generator, RND, has only 24 
bits of state. This means if you want q(n) to be less than one in a 
hundred, you can only send about 400 messages with the same user key.

Even worse, the standard way to initialize QBasic's random number 
generator is to put the statement RANDOMIZE TIMER at the beginning of 
the program. TIMER is a built in function that returns a floating point 
value containing the number of seconds since midnight. TIMER's resolution 
appears to be 1/100 of a second. but the operating system only supports 
resolution of 55 milliseconds. Assuming an eight hour variability in time 
of encryption, TIMER only supplies about 19 bits of randomness. This 
means if you want q(n) to be less than one in a hundred, you can only 
send about 72 messages with the same user key. 

3.3 Better Ways to Create the IV in QBasic
Here are some methods for generating the CipherSaber IV in QBasic. 

The first is to xor the RND values with the characters returned by the 
DATE$ function:

     randomize timer
     for i = 1 to 10
          iv$(i)=chr$(asc(mid$(date$,i,1)) xor 256*rnd)
     next  i
This method sharply reduces the likelihood that two messages will have 
the same IV. However, while the encrypted file will look random to a 
casual observer, an expert could detect that the IV was not really random 
and might even be able to extract the date of the message. In most cases 
this is not a concern since the date could be determined by the message 
header or file directory block.

Here is a method that comes closer to creating a truly random IV. It 
captures key stroke times while the user key (k$) is entered.

     get: c$=inkey$
     if c$ = "" then goto get
     if c$ = CR$ then go to done
     i=i+1
     j=(i mod 10) + 1
     k$(i)=c$
     randomize timer
     iv$(j)=chr$((256*rnd + asc(iv$(j)) mod 256)
     goto get
 
Even with DOS's low timing resolution, one can expect an 8 tick variation 
per character entered, producing 3 bits of entropy. With a 15 character 
user key, this would produce about 45 bits of entropy. The 18 to 20 bits 
of entropy represented by the first randomize timer call would bring the 
IV close to 65 bits of entropy. Given that users tend to enter random 
keys slowly, 4 bit of entropy per character is more likely, bringing us 
close to a full 80 bits of randomness.

One disadvantage of the key stroke timing method is that you must force 
the user to enter their key afresh for every message.

4. CipherSaber-2
To solve the problems caused by the single round of key setup in RC4, 
I was originally going to include a CipherSaber-2 in my proposal. 
CipherSaber-2 has a parameter N that specifies the number of times the 
RC4 key setup loop is repeated. For N=1, CipherSaber-2 would just be the 
same as CipherSaber-1. The value of N could be agreed upon by both users 
and kept secret along with the key. Indeed, N can be considered part of 
the key. I see three advantages over RC4: 

1. For n >= 2 it solves the mixing problem. User keys can be up to 246 
bytes without any problems.

2. It would coax users to have longer keys. A big weakness in 
cypto-for-the-masses is that people just will not pick long enough keys. 
Having a second "bucket" helps from a human factors perspective (sort of 
like area code and 7-digit phone number vs. a straight 10-digit phone 
number)

3. Large values of N makes exhaustive key search much slower. 
A thousand-fold increase in the time needed to test a key is equivalent 
to adding 10 bits of entropy to the key. A CipherSaber-2 written in C 
and running on a Pentium could probably stand a five or six digit N 
without an unacceptable delay.

[Note: It has been pointed out to me that an attacker can easily try 
successive values of N, so the actual benefit of keeping N secret 
is minimal. It might be better for each user to determine the largest 
value of N that is tollerable on their computer and to agree to use the 
smaller of the two acceptable N values when communicating with another 
CipherSaber user. agr 9/16/98]

I did not include CipherSaber-2 in the initial announcement because I 
wanted to keep the proposal simple and because I wanted to use a cipher 
that was straight out of a textbook. Also it is foolhardy to introduce 
a new cipher without a time for other people to review it.

5. Recommendations
To use CipherSaber securely, we recommend that users:

Use a high entropy key or passphrase. Using low entropy keys is the most 
common mistake users make A low entropy key will render any cryptosystem 
vulnerable. We recommend using a key consisting of 15 or more random 
characters, or 5 more short dictionary words. 
See http://www.hayom.com/diceware.html for a simple yet rigorous way to 
make high entropy passphrases. 

Keep keys 54 characters or shorter (most users would do this anyway) 

Use 7-bit printable characters, at least for the first few characters 
(most users would do this anyway as well) 

Use a strong method for generating the random IV, particularly if you 
plan to encode more than a few dozen messages with the same user key. 
See Section 3.3, above. 

For highest security, use CipherSaber-2, along with a strong source of 
random numbers. 


====================================================================
I want to thank Hal Finney for his valuable comments on a much 
earlier draft. Additional comments on this paper in general and on 
CipherSaber-2 in particular are welcome.

Arnold G. Reinhold

March 19, 1998 Rev f. HTML version, Basic and PC timer correction and 
minor edits April 22, 1998, May 13, 1998. CipherSaber-2 correction 
Sept. 16, 1998

Source: http://ciphersaber.gurus.com/cryptanalysis.html



------------------------------

From: [EMAIL PROTECTED]
Subject: Re: DOS vs DOS (was Re: SECURITY CLEAN...) _long_
Crossposted-To: alt.privacy
Date: Mon, 17 Jul 2000 20:26:20 GMT

[Way off-topic, bail out now! :]

In sci.crypt Rick Braddam <[EMAIL PROTECTED]> wrote:
> Well, if Linux was every bit as capable as Win98, then I wouldn't have had
> any problems writing CDs with my CD-RW drive after installing Red Hat 6.0
> on my machine. I guess I didn't really have a problem... all I had to do
> was shut down Linux and use LILO to reboot under Win98, then double-click
> on the Easy CD Creator icon. Then I could write CDs all day long. Why did
> I have to do that? No Linux program or driver was available for my CD-RW
> drive, from anywhere. Why didn't I write my own driver or program to run
> my CD-RW drive? Why should I, I already had a commercial quality program
> that could "get things done", just one of tens of thousands of
> applications which run on the PC platform under Windows.

Just for the record, Windows doesn't support EIDE CD-RWs either. The
ASPI layer is an Adaptec product, and requires that you own either an
adaptec host adaptor or software product to upgrade it. It's not
uncommon for drives to not work under various Windows versions, if the
user doesn't own Easy CD Creator.

-- 
Matt Gauthier <[EMAIL PROTECTED]>

------------------------------

From: [EMAIL PROTECTED]
Subject: Re: Carnivore and Man-in-the-middle
Date: Mon, 17 Jul 2000 20:31:52 GMT

[EMAIL PROTECTED] wrote:
>   As most of you already know, the FBI has announced its intention to
> install the "Carnivore" packet-sniffing system in every ISP's data path,
> such that all traffic passing through that ISP can be sniffed by some
> Carnivore system.  The stated purpose of this system is to snoop on the
> contents of suspected criminals' emails when permitted by judicial
> wiretap order.

As I understand it, they intend to place it at particular ISPs when
they have a court order to intercept mail. 

>   Reading about it made me think about the "Man in the Middle" attack
> against public key cryptosystems.  In order for "Man in the Middle" to
> work, the adversary must be able to intercept any communication between
> any two users of the cryptosystem and replace that communication with
> their own selected data.

Subsituting packets would be feasible (I wouldn't say trivial), but
defeating the underlying encryption schemes would be impractical.

-- 
Matt Gauthier <[EMAIL PROTECTED]>

------------------------------

From: [EMAIL PROTECTED]
Subject: Info about non-repudiation as it relates to cryptographic mathematics
Date: Mon, 17 Jul 2000 20:43:25 GMT

Hello,

I am looking for a detailed reference that describe information about
non-repudiation as it relates to cryptographic mathematics.

Any reference, paper, URL is greatly appreciated.


Thanks,

Gary


Sent via Deja.com http://www.deja.com/
Before you buy.

------------------------------

From: Benjamin Goldberg <[EMAIL PROTECTED]>
Subject: Re: DOS vs DOS (was Re: SECURITY CLEAN...) _long_
Date: Mon, 17 Jul 2000 20:54:05 GMT

Rick Braddam wrote:
> 
> "Chem-R-Us" <[EMAIL PROTECTED]> wrote in message
> news:[EMAIL PROTECTED]...
> > Fafnir wrote:
> > >
> > > Yeah, but some of us need an os that can actually get things done.
> >
> > Obviously you know little about operating systems.
> 
> That's not obvious from what Fafnir said. Do you get a lot of exercise
> by jumping to conclusions like that?
> 
> > Linux workstations are every bit as capable as any other
> > workstation, more so than a gatesware toy-station!
> 
> At first I thought you were talking about hardware here, since you
> said workstations. Then I remembered that many Linux workstations are
> the exact same hardware that "gatesware" (Win95 & Win98) runs on. So
> you must be talking about software. Linux and Win98?
> 
> Well, if Linux was every bit as capable as Win98, then I wouldn't have
> had any problems writing CDs with my CD-RW drive after installing Red
> Hat 6.0 on my machine. I guess I didn't really have a problem... all I
> had to do was shut down Linux and use LILO to reboot under Win98, then
> double-click on the Easy CD Creator icon. Then I could write CDs all
> day long. Why did I have to do that? No Linux program or driver was
> available for my CD-RW drive, from anywhere. Why didn't I write my own
> driver or program to run my CD-RW drive? Why should I, I already had a
> commercial quality program that could "get things done", just one of
> tens of thousands of applications which run on the PC platform under
> Windows.

So because there exists one type of CD-RW drive for which a Win9x driver
exists and for which *you* can't find a Linux driver for, this makes
linux not able to get things done?  What an interesting conclusion.

> My subject line? I really get a kick out of how *nix and Linux fans
> compare their operating systems to Win9x. They just don't seem to have
> a clue. Win9x may extend and add functionality to the underlying
> operating system, but they are _not_ the operating system. If they
> were, there wouldn't be a "boot to DOS" option, and you couldn't boot
> a Win9x system up to just before the point where Windows loads and
> stop there with a command interpreter running. Good old command.com.
> Running under DOS 7.0.

> They did change the version string for Win98 so that DOS identifies
> itself as Windows 98, but it's still DOS running command.com. And
> Windows is a Graphical User Interface _application_ which uses DOS
> services.
> 
> The *nixes and Linux are just DOSes running csh or bash or whatever
> other command shell you like. In spite of their insistance on
> redefining a "real" OS as requiring it to be multi-user, an OS is just
> a program which operates and controls hardware devices that are
> attached to or part of the computer system, and providing services to
> applications so the applications can use those devices. Multi-user is
> a _type_ of OS, not a requirement for an OS to be a "real" OS, just
> like Tape Operating System (TOS) and Disk Operating System (DOS) are
> types of OSes.

I don't think that an OS *has* to be multi-user, but it *does* have to
do true multiprogramming - something that DOS only emulates.  Also, it
*does* have to have a way to prevent a user in normal running mode from
changing, and perhaps damaging, parts of the system [In linux, this is
logging in as superuser vs logging in as a regular user; what equivilant
is there in Win9x?].  If you say this is unimportant, consider that if
you somehow get a virus on your computer.  If you are in user mode, it
can only trash *some* files, but if you are in root mode, it can trash
*everything*.

Also, I believe that for things like web servers [which might download
programs] or programs you've downloaded for fun, there needs to be a way
to run it in some sort of sandbox.  In unix/linux, a way of [at least
partially] doing this is to make up a user id for it [especially good
for servers], or use chroot.  DOS of course doesn't have user ids.  Does
it have anything like chroot?  Or anything similar for restricting a
program's access?

> So if the *nix and Linux command-line fanatics want to compare OSes,
> they would be more fair and honest if they compared to MS-DOS 7. Then

So we should have an analogy, unix is to dos, as x11 is to win9x?

Oops, forget I asked that - Any program I can run when X11 is going can
still be run with just my OS and a shell, simply by setting the display
environment variable to something appropriate.  If it runs under Win9x,
it won't run under DOS.  If it runs under DOS, then to run it under
Win9x, we need to pop up an emulator.  Mebbe I'm wrong, but there seems
to be a bit of a problem comparing unix/linux with dos.

> I'd have to agree that theirs is superior. They still won't run
> Win98's GUI natively, though, so they are useless to me. Their GUIs
> also won't run Win98 applications natively, so they are still useless
> to me, and millions of other computer system users.

Howcome there are implementations of X for Win9x, but none of Win9x for
Unix?  If Win were *so* much better and more important, there would be,
wouldn't there?

If Win9x is 'just a program' which runs under DOS, then shouldn't it be
easy to make some existing DOS emulators run the Win9x program?  This
hasn't been done...

> Technical superiority doesn't cut it by itself. In my opinion, OS/2
> Warp is still technically superior to Win98 (and NT/2K ??), but how
> many _new_ software titles for it do you see at your local computer
> store? Without the software, it can't "actually get things done". If
> someone would write 30 or 40 thousand device drivers for it, and port
> 40 or 50 major apps to it, it would probably take the market away from
> Windows. But it ain't gonna happen.
> 
> My Linux 6.0 installation? I deleted all the files, deleted the
> partitions, then added VFat32 partitions for Win98. I had booted the
> system up under Linux 10 or 15 times without any problems (over a
> period of several days). Then I brought the system up and started
> Gnome, browsed around some, then shut down, several times --  again
> with no problems. I decided to have Gnome autostart. After all, I
> wanted a windowing system, not a command line system. The fifth or
> sixth time I brought the system up with Gnome autostarting, it came up
> with a multi-colored confetti display.

Umm, why did you delete the files, partitions, etc?

> No indication why, just did it. I shut the system off, rebooted, and
> got the same thing again. 

Perhaps I'm mistaken, but can't you press Control+Alt+F1 to switch from
Gnome to text-mode?

> I went digging into the book that came with the CD and figured out how
> to boot the system up to a command prompt and logged in as root. I
> spent hours looking through man files, info files, and configuration
> files for anything which might help correct the problem, and never
> found anything that worked. I didn't (and don't) have time for that,
> so I removed Linux. Maybe someday I'll try it again, but I doubt it.

Ok, I'll admit this does sound like a problem.  What were you told when
you called technical support and asked for help?

> I'll stick with my gatesware toy-station for the time being. It does
> everything I want it to and a whole lot more. Bloated software? So
> what. I've got a 12.7 Gig drive in my machine now, and Gateway is
> advertising:
> 
> 11. Seagate� 15.3GB BarracudaT Hard Drive
> $102.95 after $20 instant rebate (reg. price $122.95)
> 
> that I could add right in without any hassles.
> 
> Sorry this is so long, and I don't mean to rant. If I've written
> anything which can be considered derogatory to Linux or Linux users, I
> apologize for it now. Such is not my intention. I agree that Linux is
> an excellent OS with features (that Windows don't have) that are
> absolutely essential in some situations. I don't agree that every user
> of a computer requires those features at this time. Apparently even
> Gates & Co. agrees that those features will be required in the future,
> since they've stated that Win98 will not be developed further and
> Win2K is the next Windows. Based on NT instead of DOS 7, Win2K should
> be much harder to hack than Win98 is. 
> 
> This is a lot for my $.02 worth (and maybe overpriced at that).
> 
> Rick

-- 
This is the signature worm.
Help me spread by appending me to your signature.

This is the signature worm.
Help me spread by appending me to your signature.

This is the signature worm.
Help me spread by appending me to your signature.

This is the signature worm.
Help me spread by appending me to your signature.

This is the signature worm.
Help me spread by appending me to your signature.

This is the signature worm.
Help me spread by appending me to your signature.

------------------------------

From: Daniel Leonard <[EMAIL PROTECTED]>
Subject: MD2
Date: Mon, 17 Jul 2000 21:06:02 GMT

Does anyone have any papers or links related to the MD2 message digest
algorithms.

I know about RFC 1319, so do not send this link. I am looking for critics
and attacks.

==========
Daniel L=E9onard

OGMP Informatics Division    E-Mail: [EMAIL PROTECTED]
D=E9partement de Biochimie     Tel   :
Universit=E9 de Montr=E9al       Fax   :
Montr=E9al, Quebec             Office: Pavillon Principal G-312
Canada H3C 3J7               WWW   :


------------------------------


** FOR YOUR REFERENCE **

The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:

    Internet: [EMAIL PROTECTED]

You can send mail to the entire list (and sci.crypt) via:

    Internet: [EMAIL PROTECTED]

End of Cryptography-Digest Digest
******************************

Reply via email to