Cryptography-Digest Digest #771, Volume #12 Mon, 25 Sep 00 15:13:00 EDT
Contents:
Re: Why is TwoFish better than Blowfish? (Paul Schlyter)
Re: Big CRC polynomials? ("Kasper Pedersen")
Letter substitution decoder (mls)
Re: Software patents are evil. (Jerry Coffin)
Re: Software patents are evil. (Jerry Coffin)
Re: CDMA tracking (was Re: GSM tracking) (mls)
Re: 128-bit Secure LFSR ("Cristiano")
Re: What am I missing? ("Joseph Ashwood")
sigh, AES (dbt)
Re: Tying Up Loose Ends - Correction (Bryan Olson)
Re: sigh, AES (Quisquater)
----------------------------------------------------------------------------
From: [EMAIL PROTECTED] (Paul Schlyter)
Subject: Re: Why is TwoFish better than Blowfish?
Date: 25 Sep 2000 19:08:05 +0200
In article <[EMAIL PROTECTED]>,
SCOTT19U.ZIP_GUY <[EMAIL PROTECTED]> wrote:
> [EMAIL PROTECTED] (Runu Knips) wrote in
> <[EMAIL PROTECTED]>:
>
>>Tom St Denis wrote:
>>> In article <[EMAIL PROTECTED]>,
>>> Albert Yang <[EMAIL PROTECTED]> wrote:
>>>> "David C. Barber" wrote:
>>>>> TwoFish is newer, and I would think better, than BlowFish (unless
>>>>> the AES requirements required a worse cipher), but I've never see
>>>>> n a list of reasons just why.
>>
>>In fact, the main reason why Twofish is better than Blowfish is NOT
>>improved security. Blowfish is a pc cipher, and Twofish is a general
>>cipher. Twofish offers key agility, while Blowfish doesn't. Twofish
>>can be implemented in relatively slow resource environments, while
>>Blowfish always require >4KB of key schedule data.
>
> Having known people who know the man who designed blow fish or
> two fish leads me to believe both ciphers are most likely broken by
> the NSA before they were introduced to the public. At least these
> are my feelings about these fishy ciphers. It seems like NSA humour
> to give both ciphers FISHY names.
> But since the idea of a cipher is security. It is plain stupid to
> say Twofish is better than Blowfish becasue Blowfish is a PC cipher.
> If one has a PC and is sending messages to someone with a PC then why
> use a cipher that could becasue of its ability to be run on many machines
> would ecpoxe it to more attacks.
If you don't want the cipher to be exposed, you should definitely not
implement it on PC's, since they are around everywhere. The number of
PC's in the world is only somewhat smaller than the number of computers
of any kind.....
Also: designing a piece of software to be non-portable is generally
not a good idea.
> Even if they algoritmically had
> the same level security which can't be proved anyway.
--
================================================================
Paul Schlyter, Swedish Amateur Astronomer's Society (SAAF)
Grev Turegatan 40, S-114 38 Stockholm, SWEDEN
e-mail: pausch at saaf dot se or paul.schlyter at ausys dot se
WWW: http://hotel04.ausys.se/pausch http://welcome.to/pausch
------------------------------
From: "Kasper Pedersen" <[EMAIL PROTECTED]>
Subject: Re: Big CRC polynomials?
Date: Mon, 25 Sep 2000 20:23:35 +0200
"Scott Fluhrer" <[EMAIL PROTECTED]> wrote in message
news:8qnm41$a56$[EMAIL PROTECTED]...
> Errr, no. As I demonstrated on another thread (I'll restate the proof if
> you're interested), no CRC-like algorithm that has a finite output, and
> works on arbitrarily long inputs can catch all 2 bit errors.
"will always catch n errors within a window of length m"
I did not state that m could be arbitrarily large. Of course, when your
message size (specifically the size of the payload that can contain errors)
exceeds m of the chosen polynomia, you're in the weeds.
Again: A properly chosen example polynomia can detect 2 errors within a 64
bit window with 100% certainty, and any number of errors within an 8 bit
window.
A bytewise XOR sum can detect any number of errors within a 8 bit window
too, but not always 2 errors within a 64 bit window.
I DO NOT claim that any CRC will catch all 2 bit errors in an arbitrarily
sized window.
/Kasper
------------------------------
From: mls
Subject: Letter substitution decoder
Date: Mon, 25 Sep 2000 18:34:24 GMT
No, not Captain Marvel, but am looking for a program that will try all
possible letter substitution combinations, with small library of
plaintext for matching. Maybe even in BASIC.
Assumes that the text to be decrypted is simple substitution and not
one time pad.
Anyone know of such an .exe? (Oakland is down, winfiles has
nothing...)
Thanx,
m shannon
mls at fusionsites dot com
------------------------------
From: Jerry Coffin <[EMAIL PROTECTED]>
Subject: Re: Software patents are evil.
Date: Mon, 25 Sep 2000 12:30:36 -0600
In article <8qlr47$5j7$[EMAIL PROTECTED]>,
[EMAIL PROTECTED] says...
> In <[EMAIL PROTECTED]> Darren New <[EMAIL PROTECTED]> writes:
>
> >Then you need to read my post again. We were selling the product for three
> >years. Then someone else applied for a patent, and it was cheaper to license
> >than fight. That, I would say, is broken.
>
> Yes. On the other hand you could also have just kept selling, daring the
> other person to take you to court. The problem is that that remedy,
> court action, is often worse than the damage, even if successful.
> It would be nice if there were a bureacratic way of challenging a patent
> befor having to take it to court. Ie, get the patent office to
> reconsider.
The US Congress seems to have thought the same thing would be a
really good idea -- so good, in fact, that sections 301 and 302 of
Title 35 are devoted to allowing "Any person at any time" to cite
prior art that applies to a particular patent. Section 301 allows
you to simply get your citation added to the patent's paperwork,
where it's easy for anybody else to find it. Section 302 allows you
to request the PTO to reexamine the patent in light of the prior art
you're citing. You DO have to pay a fee when/if you request that a
patent be reexamined, but it's basically a nuisance fee to keep
people from doing it without any reason -- I.e. something like
hundreds of dollars, not tens of thousands or anything like that.
There's also a provision that any "small business" (as defined by the
small business act) can get a 50% discount on essentially all fees
paid to the patent office; granted, there are businesses so small
that even if they only have to pay a couple of hundred dollars, it's
going to hurt them, but it's _very_ hard for me to believe that this
would really be more expensive than simply licensing the patent.
The problem, of course, is that in the situation he talked about,
this _probably_ doesn't make any real difference. He talked about
somebody else applying for the patent three years after they were
selling the product. If that's really the case, and they threatened
a lawsuit, about all they'd have to do is attach a mildly edited copy
of the lawsuit, where the patent holder says the product is the same
as what's patented, and proof that they were selling it three years
before.
I doubt that's what really happened though: what I suspect really
happened is that the person applied for the patent BEFORE they were
selling the product, and it took around three years for the patent
application to be processed. They infringed on the patent for three
years without knowing about it, and when the patent was issued, the
patent holder put them on notice. After examining things, the
company's attorneys undoubtedly realized that there was no way they
could win, but to put a good face on things, they made noises about
it being too expensive to fight rather than admitting that they's
simply been stealing something (albeit unknowingly) all along.
> I have heard of a situation in which a member of a standards body then
> went out and got a patent on the protocol discussed in the standards
> meeting.
I've heard at least allegations of such things happening (and don't
get me wrong: I'm not saying I think the allegations are wrong, only
unproven). There's no question that somebody who's dishonest can at
least attempt to manipulate the system in various ways, but keep in
mind that they really ARE already illegal. One of the most basic
requirements to get a patent is to sign a document swearing that you
invented this thing, and to the best of your knowledge it's new and
original. If that's false, then the applicant is committing fraud.
One of the big problems here (at least IMO) is that it's just a bit
too easy for a company to look at the downside of being caught making
a fraudulent patent application (rather small) vs. the potential
payoff if they can license the patent (often VERY large) and decide
the attempt is worth it. In theory the individual applicant could be
prosecuted for fraud, where the potential downside (prison time) is
much larger, but in reality it's often pretty easy for somebody who
knows how to do something to "lead" somebody else to invent the same
thing. At that point the underling signs the patent application and
honestly believes the invention IS original.
I think it comes down to one fact: any law we (as in "humans") make
is going to have some flaws, and be open to manipulation by
unscrupulous people. When we can find a reasonable way to ensure
against that, great, but even when/if we can't it doesn't mean we
need to throw the baby out with the bath water, and eliminate all
laws that can't be perfectly and completely enforced.
--
Later,
Jerry.
The Universe is a figment of its own imagination.
------------------------------
From: Jerry Coffin <[EMAIL PROTECTED]>
Subject: Re: Software patents are evil.
Date: Mon, 25 Sep 2000 12:30:40 -0600
In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED] says...
> Jerry Coffin wrote:
> > Please actually READ what I say before you call it nonsense. Take
> > particular note of the fact that I said "valid patent."
>
> Well, I'd assume that "valid patent" means "a patent passed by the patent
> office that has not yet been sucessfully disputed." If you mean "should
> have been issued" when you say "valid", then you're using terms differently
> from any business, court, or legal system I've encountered.
I'm using "valid" to mean...well, um...I can't think of a much better
word than "valid." You're apparently using it to mean "not having
been _proven_ to be invalid" or something like that. I'm using it to
mean exactly what it means: really and truly valid. Not dealing with
a legal (or logical) proof of validity or lack thereof, but what we'd
get from the all-knowing oracle if we could ask whether a particular
patent was valid or not. After considering all evidence (whether
known to the patent office or not), etc., it could say, "Yes, this
patent really is valid according to current law" or "No, it's really
not valid."
> Then you need to read my post again. We were selling the product for three
> years. Then someone else applied for a patent, and it was cheaper to license
> than fight. That, I would say, is broken.
I _really_ doubt that this is true. If they honestly applied for the
patent three years after you were selling the patented invention,
then fighting it would be REALLY cheap.
You'd take THEIR assertion that your product was the same as the
patented invention, you'd attach proof that you'd sold the product
three years prior to their applying for the patent, and submit them
both to the PTO with a request for reexamination under section 302 of
the patent code. Total cost to you would be typically come out to a
few thousand dollars, MOST of it in time to draft and proof-read
letters and such.
I'd guess that the patent was _granted_ rather than applied for,
three years after you started selling the product. That's about the
length of time it _typically_ takes the patent office to grant a
patent, so chances are the patent-holder invented whatever it is
around the time you started to sell it, or perhaps somewhat before
you did. In that case, fighting the patent really WOULD be expensive
at best, and probably a losing battle at worst, for the simple reason
that his patent probably really was valid, and you'd simply been
stealing somebody else's invention for years, even if you weren't
aware of it at the time.
> I think if the only patents that got issued were for actually innovative
> stuff (like RSA, say), then it would certainly be much less painful.
The law requires that the invention be original, non-obvious and
novel. Admittedly, the PTO seems (at least at times) to have rather
low thresholds for what they believe is novel and non-obvious, but
that's not an indictment of patent law, only of how it's executed.
I think the major problems are NOT with patent law, but the patent
office. I think it would be pretty easy to make things a lot better
too: simply raise the fees for patent application and maintenance,
though probably with greater provisions for reduced fees for people
who really can't afford the increase (e.g. an individual applying for
a patent would pay no more than, say, 1% of his annual income).
A sufficient increase in fees would encourage companies to only
patent worthwhile inventions. The increased revenue to the PTO would
allow them to hire more and better-qualified patent examiners as well
as improving automation and computerization to allow better searching
of prior art. The ultimate result would be to remove (or at least
drastically reduce) most of the problems while retaining the majority
of the good points of the current system.
--
Later,
Jerry.
The Universe is a figment of its own imagination.
------------------------------
From: mls
Subject: Re: CDMA tracking (was Re: GSM tracking)
Date: Mon, 25 Sep 2000 18:44:41 GMT
Unless things have changed since I was involved in this, a phone,
cell, analog, digital, CDMA, TDMA, whatever isn't transmitting
anything if power is (in fact) removed. Ergo it is not communicating
on the reverse data channel, so the cellsite equipment has no record
of it being "on the air".
Interesting, though, that some phones can, and have been modified so
they can be activated by remote (if power applied) so disable the
speaker and display while activating the microphone.
A handy surveillance device with no range limitations...
mls at fusionsites dot com
On Thu, 21 Sep 2000 21:44:41 -0600, Jerry Coffin <[EMAIL PROTECTED]>
wrote:
>In article <[EMAIL PROTECTED]>, roger_95073@my-
>dejanews.com says...
>
>[ ... ]
>
>> What if I (accdentally or deliberately) disconnected the battery
>> in Vegas, and then reconnected when I got home. Then the phone
>> would report that I had been in Vegas?
>
>I'd have to look back to be sure -- the phone I was looking at has
>both volatile and non-volatile memory. Offhand, I don't remember
>which of these this particular data is stored in. Obviously enough,
>if it's stored in the volatile memory, then removing all power will
>destroy the contents, but if it's in the non-volatile memory,
>removing power won't. As I said, I honestly don't remember which it
>gets stored in though.
>
>--
> Later,
> Jerry.
>
>The Universe is a figment of its own imagination.
------------------------------
From: "Cristiano" <[EMAIL PROTECTED]>
Subject: Re: 128-bit Secure LFSR
Date: Mon, 25 Sep 2000 20:38:14 +0200
Why do you use this (in pseudo code):
> if (m[0] & 1) { m^=feed<<1; r=1; }
> else r = 0;
> m[0] = (m[0]>>1)|(m[1]<<31);
> m[1] = (m[1]>>1)|(m[2]<<31);
> m[2] = (m[2]>>1)|(m[3]<<31);
> m[3] = (m[3]>>1)|(r<<31);
> return r;
and not:
if(m &1) { m=(m>>1)^feed; r=1; }
else { m>>=1; r=0; }
return r;
This is only a question not an advice!
Your generator is also cryptographically secure?
Cristiano
------------------------------
From: "Joseph Ashwood" <[EMAIL PROTECTED]>
Subject: Re: What am I missing?
Date: Mon, 25 Sep 2000 11:40:12 -0700
I am not in a position to make use of this idea at the moment, and I won't
be until after the award period is over, so I'm going to publish it, and if
it works, I hope someone will be kind. I am placing it in this thread
because it very much applies to SDMI, and the difficulty in creating a
watermark that can survive an attacker that is highly determined. The idea
is thus:
Take the Stream S, seperate it by frequency (use low/high pass filtering at
various frequencies) into several S[i] (where i goes from 0 to N). Using a
good random number generator create a small random shift of the substreams
S[i], call these T[i]. Generate a new stream T, which technically still has
the watermark data (it should simply be illegible), by summing the
substreams T[i]. I can see no immediate way that a watermark could survive
this.
Joe
------------------------------
From: [EMAIL PROTECTED] (dbt)
Subject: sigh, AES
Date: Mon, 25 Sep 2000 18:56:39 GMT
Any news? Wasn't it supposed to be released by now?
Is there a good place to go to keep up AES news?
--
David Terrell | "Instead of plodding through the equivalent of
Prime Minister, NebCorp | literary Xanax, the pregeeks go for sci-fi and
[EMAIL PROTECTED] | fantasy: LSD in book form." - Benjy Feen,
http://wwn.nebcorp.com | http://www.monkeybagel.com/ "Origins of Sysadmins"
------------------------------
From: Bryan Olson <[EMAIL PROTECTED]>
Subject: Re: Tying Up Loose Ends - Correction
Date: Mon, 25 Sep 2000 18:46:06 GMT
Tim Tyler wrote:
> Bryan Olson wrote:
> : With no attack better than exhaustive
> : search you have no way to rapidly eliminate any large class of keys.
>
> You might well have a method that works much faster than decrypting
> blocks and analysing the plaintext for known characteristics.
> The latter might require a number of blocks and take a non-trivial
> volume of processing.
Yes, you can work on reducing that constant. The mistake is
pretending it does something to the keyspace. The lower
bound on the work for exhaustive search increases
exponentially in the size of the key.
> : The problem is a conceptual error and cannot be fixed by adjusting
> : terminology.
>
> I don't think so - the issue appears to be purely terminological.
No. The effect of the keyspace is still there. If I give
you a thousand bits of Blowfish (448-bit key) ciphertext and
corresponding plaintext, what's the "effective keyspace"?
> : A trial decryption with one candidate key takes some minimum
constant
> : time. That time, multiplied by the number of effective keys puts a
> : lower bound on the time for exhaustive search.
>
> Generally speaking the idea that to get the total time required, you
need
> to multiply the time taken for a single decrypt by the number of keys
is a
> potentially serious conceptual error.
Processor time of course.
> This aside, you may gain the ability to reject a key after
> decrypting a single block. The ability to do so would speed
> things up.
Again, that's attacking the constant factor. Then you run
into the exponential brick wall and more redundancy or known
plaintext is no further help. The exponential is the effect
of the keyspace.
--Bryan
--
email: bolson at certicom dot com
Sent via Deja.com http://www.deja.com/
Before you buy.
------------------------------
From: Quisquater <[EMAIL PROTECTED]>
Subject: Re: sigh, AES
Date: Mon, 25 Sep 2000 21:13:38 +0200
See
http://csrc.nist.gov/encryption/aes/
Recent Announcements
September 13, 2000 - NIST is still on track to announce its proposed
selection for the AES in late summer / early fall. HOWEVER, a specific date
for the announcement has NOT been set at this time. When a date has been
selected, it will be indicated here, to give the public as much advance
notice as possible.
See also http://www.cryptonessie.org
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and sci.crypt) via:
Internet: [EMAIL PROTECTED]
End of Cryptography-Digest Digest
******************************