Cryptography-Digest Digest #939, Volume #12 Mon, 16 Oct 00 22:13:00 EDT
Contents:
Actually I want FBI and INS deport me from the U.S.A. to Europe so that I can have
more fun .... (Markku J. Saarelainen)
Algorithm Performance ([EMAIL PROTECTED])
Re: Basic skills and equipment... (Tom St Denis)
Re: Algorithm Performance (Tom St Denis)
Re: Book, "Battle of Wits" ? (John Savard)
Re: Is it trivial for NSA to crack these ciphers? (John Savard)
Re: gender vs. sex [was Rijndael implementations] (John Savard)
Re: Is it trivial for NSA to crack these ciphers? (John Savard)
Re: byte != octet [was: Re: Rijndael implementations ] (John Savard)
----------------------------------------------------------------------------
From: Markku J. Saarelainen <[EMAIL PROTECTED]>
Crossposted-To: comp.security
Subject: Actually I want FBI and INS deport me from the U.S.A. to Europe so that I can
have more fun ....
Date: Mon, 16 Oct 2000 23:15:51 GMT
I talked with one person today and expressed my opinions. A person said
maybe they do not want your type of people here in the U.S.A. This
person was also an immigrant (recently moved from Canada to the U.S.A.)
I responded: "Yes, after the years of U.S. spying and U.S. government
intelligence (economic etc.) activities against you, you change -
against the innocent person, me, without any cause - ... etc. and when
your wife is stolen away from you as the first step your deportation
one must conclude that the U.S.A. is not worthy place for living." - I
am not afraid of death and dying. Indeed I concluded already many years
ago that I do not want to live in the U.S.A. (well already in 1996),
but four years after I am still here. I indeed want the FBI, INS and
other U.S. government agencies to deport me. After all I was 21 when I
first time came here in total peace and what I found was the misery.
Indeed, the FBI and U.S. government has to get to the U.S.A. more
people like Capt. Fernandez who is currently living in Miami and
actively participated murders and killings of close to 100 political
prisoners (throats of some of these people were brutally cut). One of
the happiest days of my life shall be when I leave this country .. and
I prefer the deportation, because the U.S. government does not want me
here ... so take me back to Finland - I love this greatly. But I shall
promise to you .... I shall remember all events and experiences that I
have gone through since 1989 here in the U.S.A. and act accordingly in
Finland. I love you! When you have watched to the eye of death, one is
not afraid of dying.
Sent via Deja.com http://www.deja.com/
Before you buy.
------------------------------
From: [EMAIL PROTECTED]
Subject: Algorithm Performance
Date: Tue, 17 Oct 2000 00:00:30 GMT
I was curious if anyone had a quick and easy application to measure the
speed of crypto algorithms.
That way if I wanted to test Seal and RC4, or perhaps an rsa signature
vs. a DSA signature.
I would greatly appreciate any help.
-Jeff
Sent via Deja.com http://www.deja.com/
Before you buy.
------------------------------
From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: Basic skills and equipment...
Date: Tue, 17 Oct 2000 00:21:44 GMT
In article <[EMAIL PROTECTED]>,
John Myre <[EMAIL PROTECTED]> wrote:
> Tom St Denis wrote:
> <snip>
> > > You are STILL EVADING the question that was ASKED. The poster
asked a
> > > very specific question. He didn't ask "how can I get an elementary
> > > intro to crypto?" He did ask "what math background is required?"
> >
> > Then you should have told the poster to use sci.math or alt.math
> > instead. His post is irrevelant and off topic.
> <snip>
>
> Tom, are you trolling or are you really as stupid as
> that sounds?
Hold on, is this sci.crypt?
What the heck does "number theory studies" have todo with sci.crypt
that it can't belong to sci.math?
Honestly... you wanna talk crypto related math stick with sci.crypt.
You want to talk pure-hard-core math goto another group.
Tom
Sent via Deja.com http://www.deja.com/
Before you buy.
------------------------------
From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: Algorithm Performance
Date: Tue, 17 Oct 2000 00:20:11 GMT
In article <8sg4qr$djd$[EMAIL PROTECTED]>,
[EMAIL PROTECTED] wrote:
> I was curious if anyone had a quick and easy application to measure
the
> speed of crypto algorithms.
A very not-so-super-accurate method is to run it for a few million
itterations and count the clock ticks. If for example you output a
million bytes from RC4 in five seconds... well you know you're going at
about 200,000 bytes a second.
If you want to get very technical (often a big waste of time) you could
get out the "good 'ol processor manual" and count cycles... but
often "30 cycles" on a i586 is "10 cycles" on a K6-2 or "12 cycles" on
a MII 300, or ... This means that cycle counts are often taken out of
context. (very often in fact). So a good idea is to test your app on
several cpus (K6-2, K7, PIII and PII sounds sufficient) just to get
the "ball park" idea.
Tom
Sent via Deja.com http://www.deja.com/
Before you buy.
------------------------------
From: [EMAIL PROTECTED] (John Savard)
Subject: Re: Book, "Battle of Wits" ?
Date: Tue, 17 Oct 2000 01:09:13 GMT
On Mon, 16 Oct 2000 22:23:39 GMT, [EMAIL PROTECTED] (Jim Haynes)
wrote, in part:
>Battle of Wits by Stephen Budiansky - anybody read this and can give us
>a review?
I picked up a copy, but haven't read it completely yet. Unlike the
article I read that made me interested in it, the book isn't focused
on the technology.
Instead, it is primarily historical in focus. It seems to be an
excellent work; some of the story was known before, but now with
details added, the story is much more complete.
John Savard
http://home.ecn.ab.ca/~jsavard/crypto.htm
------------------------------
From: [EMAIL PROTECTED] (John Savard)
Subject: Re: Is it trivial for NSA to crack these ciphers?
Date: Tue, 17 Oct 2000 01:15:06 GMT
On Sun, 15 Oct 2000 21:38:53 -0700, "John A. Malley"
<[EMAIL PROTECTED]> wrote, in part:
>Kahn claims COMSEC in the NSA looks over every cryptosystem proposed to
>the agency by amateurs (pg. 710 of his book.)
That may have changed since then, however.
>We aren't that valuable in the scheme of world politics. Our thoughts,
>our positions, our cares and woes, our files, our documents are not
>matters of national security. Unless we figure highly in some
>organization, movement, political or economic structure of some
>nation-state, city or region that matters to US interests, we give no
>reason for the NSA to care about our traffic. People should realize that
>in general, no one thinks about them more than they think about
>themselves.
But if even we, small fry though we are, can use codes the NSA can't
break, would not the 'big fish' be even more advantaged?
For that matter, I suppose one could learn, from reading the E-mail of
ordinary individuals, whether (for example) a heating-oil shortage in
some country is mild or severe - one gathers intelligence where one
may.
John Savard
http://home.ecn.ab.ca/~jsavard/crypto.htm
------------------------------
From: [EMAIL PROTECTED] (John Savard)
Subject: Re: gender vs. sex [was Rijndael implementations]
Date: Tue, 17 Oct 2000 01:20:57 GMT
On Mon, 16 Oct 2000 12:53:58 GMT, Chris Jones <[EMAIL PROTECTED]>
wrote, in part:
>This has nothing to do with the previous subject line, nor the charter of this
>group. (Plus I disagree with your premise. It seems as likely to me that
>gender is used to avoid saying sex, for fear of offending prudes.)
It is with some trepidation that I respond to mere passing comments,
because the matter is off-topic.
However, while I am hesitant to pursue the matter further, it should
be noted that "gender" was not used in place of "sex" on forms in the
1950s, a time far more prudish than the present. The early instances
of the use of "gender" to denote the male or female status of an
individual instead of a word arose in connection with such things as
"gender roles", "gender studies", and so on.
Now, not offending prudes is sort of a side-benefit, and may have
helped this practice spread, but its origin lies in political
correctness and in feminism: I am quite confident of this, but am not
prepared to spend time attempting to document the matter. Perhaps W.
F. Buckley has already done so.
John Savard
http://home.ecn.ab.ca/~jsavard/crypto.htm
------------------------------
From: [EMAIL PROTECTED] (John Savard)
Subject: Re: Is it trivial for NSA to crack these ciphers?
Date: Tue, 17 Oct 2000 01:16:13 GMT
On Mon, 16 Oct 2000 08:20:57 -0500, "Stephen M. Gardner"
<[EMAIL PROTECTED]> wrote, in part:
>Secrecy is sometimes necessary but more often then
>not abused by those who would profit from it.
It certainly can be abused - but codebreaking is one of those fields
where secrecy is almost always necessary.
John Savard
http://home.ecn.ab.ca/~jsavard/crypto.htm
------------------------------
From: [EMAIL PROTECTED] (John Savard)
Subject: Re: byte != octet [was: Re: Rijndael implementations ]
Date: Tue, 17 Oct 2000 01:24:15 GMT
On Sun, 15 Oct 2000 09:09:20 -0400, Bernie Cosell
<[EMAIL PROTECTED]> wrote, in part:
>And indeed, what became pretty much the standard for us was the 7/5 byte
>pointer: 5 7-bit ascii characters per word, with the hardware smoothly
>skipping the one leftover bit at the end of the word. ==> 7 bit bytes. On
>other DEC machines, 9-bit-bytes were the standard [half-words, or
>quarter-words on the 6/10s]
In clarification, I will note that officially, and historically, the
term 'byte' has meant other things; it is that it has the meaning of
'octet' in popular usage that I claim.
The trouble with using the term 'character', of course, is that some
modes of representing characters are variable-length. A term like
'character cell' or 'storage cell' or just 'cell' would probably be
more readily understood than attempting to use 'byte' for the purpose
it officially has in the C standards.
John Savard
http://home.ecn.ab.ca/~jsavard/crypto.htm
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and sci.crypt) via:
Internet: [EMAIL PROTECTED]
End of Cryptography-Digest Digest
******************************