Cryptography-Digest Digest #703, Volume #12 Sun, 17 Sep 00 22:13:01 EDT
Contents:
Re: Dangers of using same public key for encryption and signatures? ("Brian Gladman")
Re: Killer aircraft to fly again? (Ogden Johnson III)
Re: Assistance (David A Molnar)
Re: winace encryption algorithm (David A Molnar)
Re: Killer aircraft to fly again? (Ross Smith)
Re: Lossless compression defeats watermarks ("Paul Pires")
Frequency Analysis Tables ("SafeMode")
Re: SDMI Crypto Challenge ("Paul Pires")
Re: ExCSS Source Code (David A Molnar)
A Degree in Encryption ("Nasser Ismaily")
Re: wince encryption algorithm (An Metet)
Re: Killer aircraft to fly again? (Brian Allardice)
Re: S-Boxes ("Douglas A. Gwyn")
wince encryption algorithm (No User)
----------------------------------------------------------------------------
From: "Brian Gladman" <[EMAIL PROTECTED]>
Subject: Re: Dangers of using same public key for encryption and signatures?
Date: Sun, 17 Sep 2000 22:29:44 +0100
"Simon Johnson" <[EMAIL PROTECTED]> wrote in message
news:8q2mo8$lb7$[EMAIL PROTECTED]...
> These laws are written by ignorant people for ignorant people. Since
> the one-time pad is unbreakable, it lends itself to this situation. Say
> the ask for the keys to some file. You xor a non-incriminating plain-
> text with the encrypted file to retreive a 'pseudo-one-time-pad key'
> You the surrender this as the key.
>
> They can't prove the key is incorrect without lauching an attack on the
> underlying encryption algorithm. Which is probably impossible.
> >
I agree - this and many other probelms with this legislation were pointed
out during its passage through Parliament but the UK government would not
listen.
Brian Gladman
------------------------------
From: Ogden Johnson III <[EMAIL PROTECTED]>
Crossposted-To: sci.military.naval,alt.conspiracy,sci.geo.earthquakes
Subject: Re: Killer aircraft to fly again?
Date: Sun, 17 Sep 2000 21:53:56 GMT
Mok-Kong Shen <[EMAIL PROTECTED]> wrote:
>[EMAIL PROTECTED] wrote:
>[snip]
>
>Please kindly don't cross-post to sci.crypt stuffs
>that have nothing to do with cryptology. Thanks.
>
>M. K. Shen
And why, pray tell, should sci.crypt be exempt from its fair share of
Usenet kooks?
OJ III
------------------------------
From: David A Molnar <[EMAIL PROTECTED]>
Subject: Re: Assistance
Date: 17 Sep 2000 21:38:29 GMT
Teo Li Xi <[EMAIL PROTECTED]> wrote:
> Dear all:
> Does anyone here have any experience with implementing Wei Dai's
> Crypto++ library in Microsoft Visual C++ 6 environment? I need to use
> some of the algorithms in there like DES/IDEA/RSA.
If my memory serves, Crypto++ comes with a Makefile. Opening this with VC++ creates a
project and can successfully build the library. Do a MSDN search on "makefile" and
dealing with projects
with makefiles and you should be almost there.
-David
------------------------------
From: David A Molnar <[EMAIL PROTECTED]>
Subject: Re: winace encryption algorithm
Date: 17 Sep 2000 21:39:30 GMT
Mok-Kong Shen <[EMAIL PROTECTED]> wrote:
> No User wrote:
> [snip]
> You posted doubled. I have sent follow-up to the original
> thread.
He's likely sending several posts via indepdendent chains of anonymous remailers,
on the assumption that at least one of the chains will fail. Which, sadly, is an
all too fair assumption.
-David
------------------------------
From: Ross Smith <[EMAIL PROTECTED]>
Crossposted-To: sci.military.naval,alt.conspiracy,sci.geo.earthquakes
Subject: Re: Killer aircraft to fly again?
Date: Mon, 18 Sep 2000 10:10:14 +1200
Ogden Johnson III wrote:
>
> Mok-Kong Shen <[EMAIL PROTECTED]> wrote:
>
> >[EMAIL PROTECTED] wrote:
>
> >[snip]
> >
> >Please kindly don't cross-post to sci.crypt stuffs
> >that have nothing to do with cryptology. Thanks.
> >
> >M. K. Shen
>
> And why, pray tell, should sci.crypt be exempt from its fair share of
> Usenet kooks?
Because it already *has* its fair share of Usenet kooks. If we get any
more, we'll be over quota and get complaints from Immigration.
--
Ross Smith <[EMAIL PROTECTED]> The Internet Group, Auckland, New Zealand
========================================================================
"C++ is to programming as sex is to reproduction. Better ways might
technically exist but they're not nearly as much fun." -- Nikolai Irgens
------------------------------
From: "Paul Pires" <[EMAIL PROTECTED]>
Subject: Re: Lossless compression defeats watermarks
Date: Sun, 17 Sep 2000 15:43:30 -0700
<snip>
> >The success of watermarking schemes, in a world of lossy compression,
> >depends upon either the user's willingness to accept signal degradation,
> >or the deficiencies of the lossy compression at removing spurious data.
It is only spurious if the watermark generating method is kept secret right?
The contest is set up with nothing but content and no method published right?
Why should anyone be interested in this exercise since it simply restates a
known.
Steganography can be relatively secure if the underlying method is kept secret.
If it fails this test, it was pretty dumb.
WHEN the method is leaked, it will fall.
Am I missing something here?
Paul
------------------------------
From: "SafeMode" <[EMAIL PROTECTED]>
Subject: Frequency Analysis Tables
Date: Sun, 17 Sep 2000 23:46:18 +0100
Does anybody now of a website with "Frequency Anaylysis" tables for most of
the common Greek Alphabet derivation languages??
And does anybody know of an application that can do the Frequency analysis
for me, so that I can stop going crossed eyed trying to count pages and
pages of letters?
Thanks in advance
------------------------------
From: "Paul Pires" <[EMAIL PROTECTED]>
Subject: Re: SDMI Crypto Challenge
Date: Sun, 17 Sep 2000 15:53:17 -0700
Scott Craver <[EMAIL PROTECTED]> wrote in message
news:8q386i$2ro$[EMAIL PROTECTED]...
> Tom St Denis <[EMAIL PROTECTED]> wrote:
> >
> >If you can't hear the watermark then I can do an analogue rip. So
> >what. Or I can filter it out. Or ... Just like hiding messages in
> >JPEG's. I can always filter it out.
>
> None of these will work either. Any audio watermark worth
> the Barry Manilow it's printed on will be able to survive
> digital-analog conversion. Some survive FM transmission.
> And filtering is a brute process which will squelch the music
> along with the mark.
>
> You can, of course, remove a mark, if you know where it is
> and how it is embedded. Without that detail, it's not as
> easy.
>
> >Ever notice that the levy on CDs and DVDS is because of music/video
> >piracy? But I often use CDs to pirate software ... hehhehehe so why
> >don't all software companies get shares in the levy?
>
> They're starting to. Note that Microsoft now sells "medialess"
> OS licenses. Meaning, your computer comes with Win98 or Win2000,
> but no CDs for reinstallation. If you want to replace your hard
> drive, or move all your software to a new computer, tough: the
> OEM license only applies to the specific setup you got from
> the factory.
>
> This is a (pretty strict) piracy prevention measure.
Quite the contrary, They have transformed someone who would
not pirate (because they already bought & posess a legal copy)
into someone who might pirate if they have a crash. Do you see
how nuts this is? How long do you need to retrain a non-pirate
before he becomes an avid pirate?
It's like drug traffic. Do you try to limit supply or demand?
Gates for president! He intuitively understands how contemporary
politics work.
Paul
------------------------------
From: David A Molnar <[EMAIL PROTECTED]>
Subject: Re: ExCSS Source Code
Date: 17 Sep 2000 22:48:36 GMT
David A. Wagner <[EMAIL PROTECTED]> wrote:
> Douglas A. Gwyn <[EMAIL PROTECTED]> wrote:
>> David A Molnar wrote:
>> > Also the licensing of players. Since you can't build a player without
>> > implementing CSS.
>>
>> Actually, you could -- e.g. ship a copy of the disk data off via
>> high-speed link to some existing player and ship back the audio
>> in a non-CSS encoded form. Probably not feasible any time soon,
>> but someday things like this might be done.
> My understanding is that the MPAA would probably consider this
> circumvention of the player. (Existing players include security devices
> that are supposed to prevent you from doing this.) Maybe we should
> modify David Molnar's statement slightly to "You can't build a player
> without implementing or circumventing CSS".
Right, thank you. Because, of course, DeCSS can be considered a means of
"circumventing CSS."
I like the idea of using a legitimate player as a decryption oracle,
though. :)
-david
------------------------------
From: "Nasser Ismaily" <[EMAIL PROTECTED]>
Subject: A Degree in Encryption
Date: Mon, 18 Sep 2000 00:04:05 +0400
Hi
I am looking for info as to what is the best, or proper university to enroll
for a phd in encryption. I have a degree in computer engineering and
currently working on MBA. I also have a ten yr working experience.
Any help on this will be highly appreciated.
Best Regards
------------------------------
Date: Sun, 17 Sep 2000 20:24:58 -0400
From: An Metet <[EMAIL PROTECTED]>
Subject: Re: wince encryption algorithm
On Sun, 17 Sep 2000, Nomen Nescio <[EMAIL PROTECTED]> wrote:
>This is the secret Ace (and WinAce) encryption algorithm.
yeah we've got it the first time already. the remailer network is not
that unreliable
------------------------------
From: [EMAIL PROTECTED] (Brian Allardice)
Crossposted-To: sci.military.naval,alt.conspiracy,sci.geo.earthquakes
Subject: Re: Killer aircraft to fly again?
Date: Mon, 18 Sep 2000 00:35:45 -0000
In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED] says...
>
>
>
>[EMAIL PROTECTED] wrote:
>>
>[snip]
>
>Please kindly don't cross-post to sci.crypt stuffs
>that have nothing to do with cryptology. Thanks.
For shame! You have failed to correctly decrypt a very important message!
You must try harder!
Cheers,
dba
------------------------------
From: "Douglas A. Gwyn" <[EMAIL PROTECTED]>
Subject: Re: S-Boxes
Date: Sun, 17 Sep 2000 20:49:48 -0400
Anonymous wrote:
> Sorry for me newbie question. What are S-Boxes? What are they
> used for and how are they built?
As any modern textbook on cryptology should explain,
an S-box (introduced to the public as part of the
Data Encryption Standard) performs a substitution;
it has an m-bit input and an n-bit output (for DES,
m=6 and n=4). In DES, such substitutions alternate
with permutations, to thoroughly diffuse information
as it percolates through the system. In software,
an S-box is usually built as a look-up table. For
more information, read a description of DES.
------------------------------
Date: Sun, 17 Sep 2000 19:14:59 -0500
From: No User <[EMAIL PROTECTED]>
Subject: wince encryption algorithm
This is the secret Ace (and WinAce) encryption algorithm. It is a
combination of a Blowfish derivation and a SHA-1 derivation and it
uses Cipher Block Chaining. I called it AceFish therefore...
This code will only work on machines with Intel byte order! It
shouldnt be too difficult to adapt it for Motorola byte order,
anyway.
==== begin AceFish.h ================================================
ifndef __ACEFISH_H__
define __ACEFISH_H__
typedef unsigned long u32
class AceFish
u32 _p18
u32 _s4256
u32 _cbc0, _cbc1 // for cipher block chaining
static void hash(const char str, u32 hash5)
void encrypt(u32 res_l, u32 res_r, u32 in_l, u32 in_r)
void decrypt(u32 res_l, u32 res_r, u32 in_l, u32 in_r)
public:
AceFish(const char password)
void encrypt(void buffer, size_t bytes) // (bytes 8) == 0!!
void decrypt(void buffer, size_t bytes) // (bytes 8) == 0!!
void resetCBC()
_cbc0 = _cbc1 = 0
endif
==== end AceFish.h ==================================================
==== begin AceFish.cpp ==============================================
include <string.h>
include "AceFish.h"
static u32 InitP18 =
0x243f6a88, 0x85a308d3, 0x13198a2e, 0x03707344, 0xa4093822,
0x299f31d0, 0x082efa98, 0xec4e6c89, 0x452821e6, 0x38d01377,
0xbe5466cf, 0x34e90c6c, 0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5,
0xb5470917, 0x9216d5d9, 0x8979fb1b
static u32 InitS4256 =
0xd1310ba6, 0x98dfb5ac, 0x2ffd72db, 0xd01adfb7, 0xb8e1afed,
0x6a267e96, 0xba7c9045, 0xf12c7f99, 0x24a19947, 0xb3916cf7,
0x0801f2e2, 0x858efc16, 0x636920d8, 0x71574e69, 0xa458fea3,
0xf4933d7e, 0x0d95748f, 0x728eb658, 0x718bcd58, 0x82154aee,
0x7b54a41d, 0xc25a59b5, 0x9c30d539, 0x2af26013, 0xc5d1b023,
0x286085f0, 0xca417918, 0xb8db38ef, 0x8e79dcb0, 0x603a180e,
0x6c9e0e8b, 0xb01e8a3e, 0xd71577c1, 0xbd314b27, 0x78af2fda,
0x55605c60, 0xe65525f3, 0xaa55ab94, 0x57489862, 0x63e81440,
0x55ca396a, 0x2aab10b6, 0xb4cc5c34, 0x1141e8ce, 0xa15486af,
0x7c72e993, 0xb3ee1411, 0x636fbc2a, 0x2da9c55d, 0x741831f6,
0xce5c3e16, 0x9b87901e, 0xafd6ba33, 0x6c24cf5c, 0x7a325381,
0x28958677, 0x3b8f4898, 0x6b4bb9af, 0xc4bfe81b, 0x66282193,
0x61d809cc, 0xfb21a991, 0x487cac60, 0x5dec8032, 0xef845d5d,
0xe98575b1, 0xdc262302, 0xeb651b88, 0x23893e81, 0xd396acc5,
0x0f6d6ff3, 0x83f44239, 0x2e0b4482, 0xa4842004, 0x69c8f04a,
0x9e1f9b5e, 0x21c66842, 0xf6e96c9a, 0x670c9c61, 0xabd388f0,
0x6a51a0d2, 0xd8542f68, 0x960fa728, 0xab5133a3, 0x6eef0b6c,
0x137a3be4, 0xba3bf050, 0x7efb2a98, 0xa1f1651d, 0x39af0176,
0x66ca593e, 0x82430e88, 0x8cee8619, 0x456f9fb4, 0x7d84a5c3,
0x3b8b5ebe, 0xe06f75d8, 0x85c12073, 0x401a449f, 0x56c16aa6,
0x4ed3aa62, 0x363f7706, 0x1bfedf72, 0x429b023d, 0x37d0d724,
0xd00a1248, 0xdb0fead3, 0x49f1c09b, 0x075372c9, 0x80991b7b,
0x25d479d8, 0xf6e8def7, 0xe3fe501a, 0xb6794c3b, 0x976ce0bd,
0x04c006ba, 0xc1a94fb6, 0x409f60c4, 0x5e5c9ec2, 0x196a2463,
0x68fb6faf, 0x3e6c53b5, 0x1339b2eb, 0x3b52ec6f, 0x6dfc511f,
0x9b30952c, 0xcc814544, 0xaf5ebd09, 0xbee3d004, 0xde334afd,
0x660f2807, 0x192e4bb3, 0xc0cba857, 0x45c8740f, 0xd20b5f39,
0xb9d3fbdb, 0x5579c0bd, 0x1a60320a, 0xd6a100c6, 0x412c7279,
0x679f25fe, 0xfb1fa3cc, 0x8ea5e9f8, 0xdb3222f8, 0x3c7516df,
0xfd616b15, 0x2f501ec8, 0xad0552ab, 0x323db5fa, 0xfd238760,
0x53317b48, 0x3e00df82, 0x9e5c57bb, 0xca6f8ca0, 0x1a87562e,
0xdf1769db, 0xd542a8f6, 0x287effc3, 0xac6732c6, 0x8c4f5573,
0x695b27b0, 0xbbca58c8, 0xe1ffa35d, 0xb8f011a0, 0x10fa3d98,
0xfd2183b8, 0x4afcb56c, 0x2dd1d35b, 0x9a53e479, 0xb6f84565,
0xd28e49bc, 0x4bfb9790, 0xe1ddf2da, 0xa4cb7e33, 0x62fb1341,
0xcee4c6e8, 0xef20cada, 0x36774c01, 0xd07e9efe, 0x2bf11fb4,
0x95dbda4d, 0xae909198, 0xeaad8e71, 0x6b93d5a0, 0xd08ed1d0,
0xafc725e0, 0x8e3c5b2f, 0x8e7594b7, 0x8ff6e2fb, 0xf2122b64,
0x8888b812, 0x900df01c, 0x4fad5ea0, 0x688fc31c, 0xd1cff191,
0xb3a8c1ad, 0x2f2f2218, 0xbe0e1777, 0xea752dfe, 0x8b021fa1,
0xe5a0cc0f, 0xb56f74e8, 0x18acf3d6, 0xce89e299, 0xb4a84fe0,
0xfd13e0b7, 0x7cc43b81, 0xd2ada8d9, 0x165fa266, 0x80957705,
0x93cc7314, 0x211a1477, 0xe6ad2065, 0x77b5fa86, 0xc75442f5,
0xfb9d35cf, 0xebcdaf0c, 0x7b3e89a0, 0xd6411bd3, 0xae1e7e49,
0x00250e2d, 0x2071b35e, 0x226800bb, 0x57b8e0af, 0x2464369b,
0xf009b91e, 0x5563911d, 0x59dfa6aa, 0x78c14389, 0xd95a537f,
0x207d5ba2, 0x02e5b9c5, 0x83260376, 0x6295cfa9, 0x11c81968,
0x4e734a41, 0xb3472dca, 0x7b14a94a, 0x1b510052, 0x9a532915,
0xd60f573f, 0xbc9bc6e4, 0x2b60a476, 0x81e67400, 0x08ba6fb5,
0x571be91f, 0xf296ec6b, 0x2a0dd915, 0xb6636521, 0xe7b9f9b6,
0xff34052e, 0xc5855664, 0x53b02d5d, 0xa99f8fa1, 0x08ba4799,
0x6e85076a
,
0x4b7a70e9, 0xb5b32944, 0xdb75092e, 0xc4192623, 0xad6ea6b0,
0x49a7df7d, 0x9cee60b8, 0x8fedb266, 0xecaa8c71, 0x699a17ff,
0x5664526c, 0xc2b19ee1, 0x193602a5, 0x75094c29, 0xa0591340,
0xe4183a3e, 0x3f54989a, 0x5b429d65, 0x6b8fe4d6, 0x99f73fd6,
0xa1d29c07, 0xefe830f5, 0x4d2d38e6, 0xf0255dc1, 0x4cdd2086,
0x8470eb26, 0x6382e9c6, 0x021ecc5e, 0x09686b3f, 0x3ebaefc9,
0x3c971814, 0x6b6a70a1, 0x687f3584, 0x52a0e286, 0xb79c5305,
0xaa500737, 0x3e07841c, 0x7fdeae5c, 0x8e7d44ec, 0x5716f2b8,
0xb03ada37, 0xf0500c0d, 0xf01c1f04, 0x0200b3ff, 0xae0cf51a,
0x3cb574b2, 0x25837a58, 0xdc0921bd, 0xd19113f9, 0x7ca92ff6,
0x94324773, 0x22f54701, 0x3ae5e581, 0x37c2dadc, 0xc8b57634,
0x9af3dda7, 0xa9446146, 0x0fd0030e, 0xecc8c73e, 0xa4751e41,
0xe238cd99, 0x3bea0e2f, 0x3280bba1, 0x183eb331, 0x4e548b38,
0x4f6db908, 0x6f420d03, 0xf60a04bf, 0x2cb81290, 0x24977c79,
0x5679b072, 0xbcaf89af, 0xde9a771f, 0xd9930810, 0xb38bae12,
0xdccf3f2e, 0x5512721f, 0x2e6b7124, 0x501adde6, 0x9f84cd87,
0x7a584718, 0x7408da17, 0xbc9f9abc, 0xe94b7d8c, 0xec7aec3a,
0xdb851dfa, 0x63094366, 0xc464c3d2, 0xef1c1847, 0x3215d908,
0xdd433b37, 0x24c2ba16, 0x12a14d43, 0x2a65c451, 0x50940002,
0x133ae4dd, 0x71dff89e, 0x10314e55, 0x81ac77d6, 0x5f11199b,
0x043556f1, 0xd7a3c76b, 0x3c11183b, 0x5924a509, 0xf28fe6ed,
0x97f1fbfa, 0x9ebabf2c, 0x1e153c6e, 0x86e34570, 0xeae96fb1,
0x860e5e0a, 0x5a3e2ab3, 0x771fe71c, 0x4e3d06fa, 0x2965dcb9,
0x99e71d0f, 0x803e89d6, 0x5266c825, 0x2e4cc978, 0x9c10b36a,
0xc6150eba, 0x94e2ea78, 0xa5fc3c53, 0x1e0a2df4, 0xf2f74ea7,
0x361d2b3d, 0x1939260f, 0x19c27960, 0x5223a708, 0xf71312b6,
0xebadfe6e, 0xeac31f66, 0xe3bc4595, 0xa67bc883, 0xb17f37d1,
0x018cff28, 0xc332ddef, 0xbe6c5aa5, 0x65582185, 0x68ab9802,
0xeecea50f, 0xdb2f953b, 0x2aef7dad, 0x5b6e2f84, 0x1521b628,
0x29076170, 0xecdd4775, 0x619f1510, 0x13cca830, 0xeb61bd96,
0x0334fe1e, 0xaa0363cf, 0xb5735c90, 0x4c70a239, 0xd59e9e0b,
0xcbaade14, 0xeecc86bc, 0x60622ca7, 0x9cab5cab, 0xb2f3846e,
0x648b1eaf, 0x19bdf0ca, 0xa02369b9, 0x655abb50, 0x40685a32,
0x3c2ab4b3, 0x319ee9d5, 0xc021b8f7, 0x9b540b19, 0x875fa099,
0x95f7997e, 0x623d7da8, 0xf837889a, 0x97e32d77, 0x11ed935f,
0x16681281, 0x0e358829, 0xc7e61fd6, 0x96dedfa1, 0x7858ba99,
0x57f584a5, 0x1b227263, 0x9b83c3ff, 0x1ac24696, 0xcdb30aeb,
0x532e3054, 0x8fd948e4, 0x6dbc3128, 0x58ebf2ef, 0x34c6ffea,
0xfe28ed61, 0xee7c3c73, 0x5d4a14d9, 0xe864b7e3, 0x42105d14,
0x203e13e0, 0x45eee2b6, 0xa3aaabea, 0xdb6c4f15, 0xfacb4fd0,
0xc742f442, 0xef6abbb5, 0x654f3b1d, 0x41cd2105, 0xd81e799e,
0x86854dc7, 0xe44b476a, 0x3d816250, 0xcf62a1f2, 0x5b8d2646,
0xfc8883a0, 0xc1c7b6a3, 0x7f1524c3, 0x69cb7492, 0x47848a0b,
0x5692b285, 0x095bbf00, 0xad19489d, 0x1462b174, 0x23820e00,
0x58428d2a, 0x0c55f5ea, 0x1dadf43e, 0x233f7061, 0x3372f092,
0x8d937e41, 0xd65fecf1, 0x6c223bdb, 0x7cde3759, 0xcbee7460,
0x4085f2a7, 0xce77326e, 0xa6078084, 0x19f8509e, 0xe8efd855,
0x61d99735, 0xa969a7aa, 0xc50c06c2, 0x5a04abfc, 0x800bcadc,
0x9e447a2e, 0xc3453484, 0xfdd56705, 0x0e1e9ec9, 0xdb73dbd3,
0x105588cd, 0x675fda79, 0xe3674340, 0xc5c43465, 0x713e38d8,
0x3d28f89e, 0xf16dff20, 0x153e21e7, 0x8fb03d4a, 0xe6e39f2b,
0xdb83adf7
,
0xe93d5a68, 0x948140f7, 0xf64c261c, 0x94692934, 0x411520f7,
0x7602d4f7, 0xbcf46b2e, 0xd4a20068, 0xd4082471, 0x3320f46a,
0x43b7d4b7, 0x500061af, 0x1e39f62e, 0x97244546, 0x14214f74,
0xbf8b8840, 0x4d95fc1d, 0x96b591af, 0x70f4ddd3, 0x66a02f45,
0xbfbc09ec, 0x03bd9785, 0x7fac6dd0, 0x31cb8504, 0x96eb27b3,
0x55fd3941, 0xda2547e6, 0xabca0a9a, 0x28507825, 0x530429f4,
0x0a2c86da, 0xe9b66dfb, 0x68dc1462, 0xd7486900, 0x680ec0a4,
0x27a18dee, 0x4f3ffea2, 0xe887ad8c, 0xb58ce006, 0x7af4d6b6,
0xaace1e7c, 0xd3375fec, 0xce78a399, 0x406b2a42, 0x20fe9e35,
0xd9f385b9, 0xee39d7ab, 0x3b124e8b, 0x1dc9faf7, 0x4b6d1856,
0x26a36631, 0xeae397b2, 0x3a6efa74, 0xdd5b4332, 0x6841e7f7,
0xca7820fb, 0xfb0af54e, 0xd8feb397, 0x454056ac, 0xba489527,
0x55533a3a, 0x20838d87, 0xfe6ba9b7, 0xd096954b, 0x55a867bc,
0xa1159a58, 0xcca92963, 0x99e1db33, 0xa62a4a56, 0x3f3125f9,
0x5ef47e1c, 0x9029317c, 0xfdf8e802, 0x04272f70, 0x80bb155c,
0x05282ce3, 0x95c11548, 0xe4c66d22, 0x48c1133f, 0xc70f86dc,
0x07f9c9ee, 0x41041f0f, 0x404779a4, 0x5d886e17, 0x325f51eb,
0xd59bc0d1, 0xf2bcc18f, 0x41113564, 0x257b7834, 0x602a9c60,
0xdff8e8a3, 0x1f636c1b, 0x0e12b4c2, 0x02e1329e, 0xaf664fd1,
0xcad18115, 0x6b2395e0, 0x333e92e1, 0x3b240b62, 0xeebeb922,
0x85b2a20e, 0xe6ba0d99, 0xde720c8c, 0x2da2f728, 0xd0127845,
0x95b794fd, 0x647d0862, 0xe7ccf5f0, 0x5449a36f, 0x877d48fa,
0xc39dfd27, 0xf33e8d1e, 0x0a476341, 0x992eff74, 0x3a6f6eab,
0xf4f8fd37, 0xa812dc60, 0xa1ebddf8, 0x991be14c, 0xdb6e6b0d,
0xc67b5510, 0x6d672c37, 0x2765d43b, 0xdcd0e804, 0xf1290dc7,
0xcc00ffa3, 0xb5390f92, 0x690fed0b, 0x667b9ffb, 0xcedb7d9c,
0xa091cf0b, 0xd9155ea3, 0xbb132f88, 0x515bad24, 0x7b9479bf,
0x763bd6eb, 0x37392eb3, 0xcc115979, 0x8026e297, 0xf42e312d,
0x6842ada7, 0xc66a2b3b, 0x12754ccc, 0x782ef11c, 0x6a124237,
0xb79251e7, 0x06a1bbe6, 0x4bfb6350, 0x1a6b1018, 0x11caedfa,
0x3d25bdd8, 0xe2e1c3c9, 0x44421659, 0x0a121386, 0xd90cec6e,
0xd5abea2a, 0x64af674e, 0xda86a85f, 0xbebfe988, 0x64e4c3fe,
0x9dbc8057, 0xf0f7c086, 0x60787bf8, 0x6003604d, 0xd1fd8346,
0xf6381fb0, 0x7745ae04, 0xd736fccc, 0x83426b33, 0xf01eab71,
0xb0804187, 0x3c005e5f, 0x77a057be, 0xbde8ae24, 0x55464299,
0xbf582e61, 0x4e58f48f, 0xf2ddfda2, 0xf474ef38, 0x8789bdc2,
0x5366f9c3, 0xc8b38e74, 0xb475f255, 0x46fcd9b9, 0x7aeb2661,
0x8b1ddf84, 0x846a0e79, 0x915f95e2, 0x466e598e, 0x20b45770,
0x8cd55591, 0xc902de4c, 0xb90bace1, 0xbb8205d0, 0x11a86248,
0x7574a99e, 0xb77f19b6, 0xe0a9dc09, 0x662d09a1, 0xc4324633,
0xe85a1f02, 0x09f0be8c, 0x4a99a025, 0x1d6efe10, 0x1ab93d1d,
0x0ba5a4df, 0xa186f20f, 0x2868f169, 0xdcb7da83, 0x573906fe,
0xa1e2ce9b, 0x4fcd7f52, 0x50115e01, 0xa70683fa, 0xa002b5c4,
0x0de6d027, 0x9af88c27, 0x773f8641, 0xc3604c06, 0x61a806b5,
0xf0177a28, 0xc0f586e0, 0x006058aa, 0x30dc7d62, 0x11e69ed7,
0x2338ea63, 0x53c2dd94, 0xc2c21634, 0xbbcbee56, 0x90bcb6de,
0xebfc7da1, 0xce591d76, 0x6f05e409, 0x4b7c0188, 0x39720a3d,
0x7c927c24, 0x86e3725f, 0x724d9db9, 0x1ac15bb4, 0xd39eb8fc,
0xed545578, 0x08fca5b5, 0xd83d7cd3, 0x4dad0fc4, 0x1e50ef5e,
0xb161e6f8, 0xa28514d9, 0x6c51133c, 0x6fd5c7e7, 0x56e14ec4,
0x362abfce, 0xddc6c837, 0xd79a3234, 0x92638212, 0x670efa8e,
0x406000e0
,
0x3a39ce37, 0xd3faf5cf, 0xabc27737, 0x5ac52d1b, 0x5cb0679e,
0x4fa33742, 0xd3822740, 0x99bc9bbe, 0xd5118e9d, 0xbf0f7315,
0xd62d1c7e, 0xc700c47b, 0xb78c1b6b, 0x21a19045, 0xb26eb1be,
0x6a366eb4, 0x5748ab2f, 0xbc946e79, 0xc6a376d2, 0x6549c2c8,
0x530ff8ee, 0x468dde7d, 0xd5730a1d, 0x4cd04dc6, 0x2939bbdb,
0xa9ba4650, 0xac9526e8, 0xbe5ee304, 0xa1fad5f0, 0x6a2d519a,
0x63ef8ce2, 0x9a86ee22, 0xc089c2b8, 0x43242ef6, 0xa51e03aa,
0x9cf2d0a4, 0x83c061ba, 0x9be96a4d, 0x8fe51550, 0xba645bd6,
0x2826a2f9, 0xa73a3ae1, 0x4ba99586, 0xef5562e9, 0xc72fefd3,
0xf752f7da, 0x3f046f69, 0x77fa0a59, 0x80e4a915, 0x87b08601,
0x9b09e6ad, 0x3b3ee593, 0xe990fd5a, 0x9e34d797, 0x2cf0b7d9,
0x022b8b51, 0x96d5ac3a, 0x017da67d, 0xd1cf3ed6, 0x7c7d2d28,
0x1f9f25cf, 0xadf2b89b, 0x5ad6b472, 0x5a88f54c, 0xe029ac71,
0xe019a5e6, 0x47b0acfd, 0xed93fa9b, 0xe8d3c48d, 0x283b57cc,
0xf8d56629, 0x79132e28, 0x785f0191, 0xed756055, 0xf7960e44,
0xe3d35e8c, 0x15056dd4, 0x88f46dba, 0x03a16125, 0x0564f0bd,
0xc3eb9e15, 0x3c9057a2, 0x97271aec, 0xa93a072a, 0x1b3f6d9b,
0x1e6321f5, 0xf59c66fb, 0x26dcf319, 0x7533d928, 0xb155fdf5,
0x03563482, 0x8aba3cbb, 0x28517711, 0xc20ad9f8, 0xabcc5167,
0xccad925f, 0x4de81751, 0x3830dc8e, 0x379d5862, 0x9320f991,
0xea7a90c2, 0xfb3e7bce, 0x5121ce64, 0x774fbe32, 0xa8b6e37e,
0xc3293d46, 0x48de5369, 0x6413e680, 0xa2ae0810, 0xdd6db224,
0x69852dfd, 0x09072166, 0xb39a460a, 0x6445c0dd, 0x586cdecf,
0x1c20c8ae, 0x5bbef7dd, 0x1b588d40, 0xccd2017f, 0x6bb4e3bb,
0xdda26a7e, 0x3a59ff45, 0x3e350a44, 0xbcb4cdd5, 0x72eacea8,
0xfa6484bb, 0x8d6612ae, 0xbf3c6f47, 0xd29be463, 0x542f5d9e,
0xaec2771b, 0xf64e6370, 0x740e0d8d, 0xe75b1357, 0xf8721671,
0xaf537d5d, 0x4040cb08, 0x4eb4e2cc, 0x34d2466a, 0x0115af84,
0xe1b00428, 0x95983a1d, 0x06b89fb4, 0xce6ea048, 0x6f3f3b82,
0x3520ab82, 0x011a1d4b, 0x277227f8, 0x611560b1, 0xe7933fdc,
0xbb3a792b, 0x344525bd, 0xa08839e1, 0x51ce794b, 0x2f32c9b7,
0xa01fbac9, 0xe01cc87e, 0xbcc7d1f6, 0xcf0111c3, 0xa1e8aac7,
0x1a908749, 0xd44fbd9a, 0xd0dadecb, 0xd50ada38, 0x0339c32a,
0xc6913667, 0x8df9317c, 0xe0b12b4f, 0xf79e59b7, 0x43f5bb3a,
0xf2d519ff, 0x27d9459c, 0xbf97222c, 0x15e6fc2a, 0x0f91fc71,
0x9b941525, 0xfae59361, 0xceb69ceb, 0xc2a86459, 0x12baa8d1,
0xb6c1075e, 0xe3056a0c, 0x10d25065, 0xcb03a442, 0xe0ec6e0e,
0x1698db3b, 0x4c98a0be, 0x3278e964, 0x9f1f9532, 0xe0d392df,
0xd3a0342b, 0x8971f21e, 0x1b0a7441, 0x4ba3348c, 0xc5be7120,
0xc37632d8, 0xdf359f8d, 0x9b992f2e, 0xe60b6f47, 0x0fe3f11d,
0xe54cda54, 0x1edad891, 0xce6279cf, 0xcd3e7e6f, 0x1618b166,
0xfd2c1d05, 0x848fd2c5, 0xf6fb2299, 0xf523f357, 0xa6327623,
0x93a83531, 0x56cccd02, 0xacf08162, 0x5a75ebb5, 0x6e163697,
0x88d273cc, 0xde966292, 0x81b949d0, 0x4c50901b, 0x71c65614,
0xe6c6c7bd, 0x327a140a, 0x45e1d006, 0xc3f27b9a, 0xc9aa53fd,
0x62a80f00, 0xbb25bfe2, 0x35bdd2f6, 0x71126905, 0xb2040222,
0xb6cbcf7c, 0xcd769c2b, 0x53113ec0, 0x1640e3d3, 0x38abbd60,
0x2547adf0, 0xba38209c, 0xf746ce76, 0x77afa1c5, 0x20756060,
0x85cbfe4e, 0x8ae88dd8, 0x7aaaf9b0, 0x4cf9aa7e, 0x1948c25c,
0x02fb8a8c, 0x01c36ae4, 0xd6ebe1f9, 0x90d4f869, 0xa65cdea0,
0x3f09252d, 0xc208e69f, 0xb74e6132, 0xce77e25b, 0x578fdfe3,
0x3ac372e6
void AceFish::hash(const char str, u32 hash5)
u32 w80 = 0
int len = strlen(str)
memcpy(w, str, len)
((unsigned char)w)len = 0x80
w15 = 8len
hash0 = 0x67452301UL hash1 = 0xEFCDAB89UL
hash2 = 0x98BADCFEUL hash3 = 0x10325476UL
hash4 = 0xC3D2E1F0UL
int t
for (t = 16 t < 80 t++)
wt = wt-3 wt-8 wt- 14 wt-16
u32 a = hash0, b = hash1, c = hash2, d = hash3,
e = hash4
for (t = 0 t < 20 t++)
u32 temp = ((a << 5) (a >> 27)) + ((b c) (~b d)) +
e + wt + 0x5A827999UL
e = d d = c c = (b << 30) (b >> 2) b = a a = temp
for (t = 20 t < 40 t++)
u32 temp = ((a << 5) (a >> 27)) + (b c d) + e +
wt + 0x6ED9EBA1UL
e = d d = c c = (b << 30) (b >> 2) b = a a = temp
for (t = 40 t < 60 t++)
u32 temp = ((a << 5) (a >> 27)) +
((b c) (b d) (c d)) + e +
wt + 0x8F1BBCDCUL
e = d d = c c = (b << 30) (b >> 2) b = a a = temp
for (t = 60 t < 80 t++)
u32 temp = ((a << 5) (a >> 27)) + (b c d) + e +
wt + 0xCA62C1D6UL
e = d d = c c = (b << 30) (b >> 2) b = a a = temp
hash0 += a hash1 += b hash2 += c
hash3 += d hash4 += e
AceFish::AceFish(const char password)
u32 h5
hash(password, h)
memcpy(_p, InitP, 18 sizeof(u32))
memcpy(_s, InitS, 4 256 sizeof(u32))
int i
for (i = 0 i < 18 ++i)
_pi = hi 5
u32 data_l = 0, data_r = 0
for (i = 0 i < 18 i += 2)
encrypt(data_l, data_r, data_l, data_r)
_pi = data_l
_pi + 1 = data_r
for (i = 0 i < 4 ++i)
for (int j = 0 j < 256 j += 2)
encrypt(data_l, data_r, data_l, data_r)
_sij = data_l
_sij + 1 = data_r
resetCBC()
void AceFish::encrypt(u32 res_l, u32 res_r, u32 in_l, u32 in_r)
for (int i = 0 i < 16 ++i)
in_l = _pi
u32 temp = _s0((unsigned char)in_l+3)
temp += _s1((unsigned char)in_l+2)
temp = _s2((unsigned char)in_l+1)
temp += _s3(unsigned char)in_l
in_r = temp
temp = in_l in_l = in_r in_r = temp
res_l = in_r _p17
res_r = in_l _p16
void AceFish::decrypt(u32 res_l, u32 res_r, u32 in_l, u32 in_r)
for (int i = 17 i > 1 --i)
in_l = _pi
u32 temp = _s0((unsigned char)in_l+3)
temp += _s1((unsigned char)in_l+2)
temp = _s2((unsigned char)in_l+1)
temp += _s3(unsigned char)in_l
in_r = temp
temp = in_l in_l = in_r in_r = temp
res_l = in_r _p0
res_r = in_l _p1
void AceFish::encrypt(void buffer, size_t bytes)
u32 b = (u32)buffer
size_t blocks = bytes >> 3
while (blocks--)
b0 = _cbc0 b1 = _cbc1
encrypt(b0, b1, b0, b1)
_cbc0 = b0 _cbc1 = b1
b += 2
void AceFish::decrypt(void buffer, size_t bytes)
u32 b = (u32)buffer
size_t blocks = bytes >> 3
while (blocks--)
u32 e0 = b0, e1 = b1
decrypt(b0, b1, b0, b1)
b0 = _cbc0 b1 = _cbc1
_cbc0 = e0 _cbc1 = e1
b += 2
==== end AceFish.cpp ================================================
==== begin AceFishTest.cpp ==========================================
include <stdio.h>
include <string.h>
include "AceFish.h"
unsigned char small_ace_file95 =
0xe9, 0xec, 0x1b, 0x00, 0x00, 0x00, 0x00, 0x2a, // 0: .......
0x2a, 0x41, 0x43, 0x45, 0x2a, 0x2a, 0x0a, 0x14, // 8: ACE..
0x02, 0x00, 0x6f, 0x96, 0x2a, 0x29, 0x90, 0x69, // 10: ..o.).i
0x39, 0xfb, 0x00, 0x00, 0x00, 0x00, 0x00, 0x24, // 18: 9......$
0xd5, 0x24, 0x00, 0x01, 0x01, 0x40, 0x18, 0x00, // 20: .$...@..
0x00, 0x00, 0x16, 0x00, 0x00, 0x00, 0x6c, 0x96, // 28: ......l.
0x2a, 0x29, 0x20, 0x00, 0x00, 0x00, 0x88, 0x28, // 30: ) ....(
0x37, 0x06, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // 38: 7.......
0x05, 0x00, 0x78, 0x2e, 0x74, 0x78, 0x74, 0x1e, // 40: ..x.txt.
0xdc, 0xa1, 0x1a, 0xb5, 0x57, 0x12, 0x20, 0x05, // 48: ....W. .
0x88, 0x7d, 0x5c, 0x26, 0xcd, 0x21, 0x2a, 0xad, // 50: ..!.
0xe7, 0x20, 0x8c, 0x42, 0x2c, 0xb2, 0x62 // 58: . .B,.b
int main()
const u32 file_offset = 0x47
const unsigned char data = small_ace_file + file_offset
const size_t size = sizeof(small_ace_file) - file_offset
unsigned char buffersize
memcpy(buffer, data, size)
AceFish acefish("password")
acefish.decrypt(buffer, size)
printf("decrypted data: sn", buffer)
acefish.resetCBC()
acefish.encrypt(buffer, size)
for (size_t i = 0 i < size i++)
if (bufferi != datai)
printf("re-encryption failedn")
return 0
printf("re-encryption was successfuln")
return 0
==== end AceFishTest.cpp ============================================
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and sci.crypt) via:
Internet: [EMAIL PROTECTED]
End of Cryptography-Digest Digest
******************************