Cryptography-Digest Digest #87, Volume #13 Fri, 3 Nov 00 18:13:00 EST
Contents:
Re: Rijndael Security (SCOTT19U.ZIP_GUY)
Re: srp-1.7.0 released w/TLS Telnet security, X11 forwarding support (Michael
Erskine)
Re: Visual Basic (Ichinin)
Re: Microsoft's script encoder ("Lefty Louther")
Re: Hardware RNGs ([EMAIL PROTECTED])
Re: Crypto Export Restrictions (Scott Craver)
Re: Microsoft's script encoder (Simon Johnson)
Re: Microsoft's script encoder ("Lefty Louther")
Re: Calculating the redudancy of english? (JPeschel)
Re: how i decode this? ("David C. Barber")
Re: Calculating the redudancy of english? ("Kristopher Johnson")
Crypto++ 4.0 released, and updated crypto benchmarks (Wei Dai)
Re: Q: Computations in a Galois Field (Mok-Kong Shen)
Re: Q: Computations in a Galois Field (Mok-Kong Shen)
example code for your use (Kenneth Lantrip)
----------------------------------------------------------------------------
From: [EMAIL PROTECTED] (SCOTT19U.ZIP_GUY)
Subject: Re: Rijndael Security
Date: 3 Nov 2000 19:08:17 GMT
[EMAIL PROTECTED] (ajd) wrote in
<3a028dcf$[EMAIL PROTECTED]>:
>
>How secure is Rijndael when given (most of) the plaintext and the cipher
>text? For example if I encrypt a bitmap (and somehow the interceptor
>knows its a bitmap), the interceptor then knows that the first block
>will decrypt to
>
>42 4D ** ** ** ** 00 00 00 00 36 00 00 00 28 00
>
>where bytes 0-1 are the bitmap identifier
>2-5 are the file size (which the interceptor doesn't *quite* know as my
>encrypted file will be a multiple of the block size, and vthe plaintext
>file may not be)
>6-9 reserved and always zero
>10-13 is the offset to beginning of bitmap data
>14-17 is th header size
>
>Given this information about the plaintext, and given the encrypted
>text, can the interceptor work out the key? It seems to me like we are
>giving away a bit too much information. Is there a standard to get
>around this problem?
>
>regards
>andrew
>
>
I agree with you especailly if the attacker knows what kind of file
your sending. There are many ways to get a round this problem you could
use MAtts BICOM he takes exactly this kind of header problem in to
condsideration. Since after the compression phase the first 20 K of the
file is whitetened then the CBC mode of Rijndael occurs. Or you
could use compress and use a all or nothing encryption pass like
scott16u to whiten the whole file compressed or not compressed and
then use the blessed AES method supplied in Matts code. THe advantage
of the second is that even a one bit change in the input file changes
the whole file. No matter how long it is.
But if you follow so called experts which may not really care if
your stuff is safe. THey will either give a none bijectiv method
or say same crap that modern ciphers are to hard to break so don't
worry about it.
David A. Scott
--
SCOTT19U.ZIP NOW AVAILABLE WORLD WIDE
http://www.jim.com/jamesd/Kong/scott19u.zip
Scott famous encryption website **now all allowed**
http://members.xoom.com/ecil/index.htm
Scott LATEST UPDATED source for scott*u.zip
http://radiusnet.net/crypto/ then look for
sub directory scott after pressing CRYPTO
Scott famous Compression Page
http://members.xoom.com/ecil/compress.htm
**NOTE EMAIL address is for SPAMERS***
I leave you with this final thought from President Bill Clinton:
------------------------------
From: Michael Erskine <[EMAIL PROTECTED]>
Crossposted-To: comp.security.unix,comp.os.linux.security
Subject: Re: srp-1.7.0 released w/TLS Telnet security, X11 forwarding support
Date: Fri, 03 Nov 2000 14:25:38 -0500
Thomas Wu wrote:
Thomas, thank you.
--
Watch your thoughts; they become words.
Watch your words; they become actions.
Watch your actions; they become habits. -- Frank Outlaw
Watch your habits; they become character.
Watch your character; it becomes your destiny.
------------------------------
From: Ichinin <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
Subject: Re: Visual Basic
Date: Fri, 03 Nov 2000 07:24:28 +0100
Patterson Programming wrote:
> Ichinin, your syntax uses a 'variant' data type. There is a risk that VB
> would move/copy the data in dynamic memory. That makes 'burning' the key
> material unreliable. I prefer to use static numeric arrays for such
> purposes.
Perhaps, but have you tried it?
You could even try:
Stuff = Array("1", "2", "3", ... , "N")
For X...next
Value = Cint(Stuff(X))
Next X
> Also, performance is at least as high using my implementation.
Yes, but some people are concerned with the _layout_ of your
implementation, after all - the layout of your code is sooooo
much more important than actual performance, isn't it? :o)
(yes, irony is the word of the day...)
Regards,
Ichinin
------------------------------
From: "Lefty Louther" <[EMAIL PROTECTED]>
Subject: Re: Microsoft's script encoder
Date: Fri, 3 Nov 2000 21:28:26 +0200
I don't think it's a byte code because you can convert any text you like via
screnc.exe not only code.
Lefty
>
> It most likely is not an encryption algorithm, perhaps it's a byte code
> (like java) stored using ASCII chars...
>
> Tom
>
>
> Sent via Deja.com http://www.deja.com/
> Before you buy.
------------------------------
From: [EMAIL PROTECTED]
Subject: Re: Hardware RNGs
Date: Fri, 03 Nov 2000 19:18:57 GMT
> No, of course not. However, at least it doesn't *reduce* entropy
Actually I will differ with you there, you seem to be making the common
mistake of assuming that SHA-(whatever) offers perfect entropy
consolidation, we have no such proof, and my belief at least is to the
contrary. To test my theory of non-perfect entropy reduction would be
compute intensive or human intensive, but I believe that if you take a
start value, feed that into the hash function, feed the result into the
hash function, etc. I believe you will find a loop sooner than full
exhaustion (2^256 for SHA-256). This reveals non-perfect entropy
because it reveals that from that start value, the nth value in the
chain can be guessed with probably higher than 1/{output space} without
computing the value.
Granted the space will be enormous, for SHA-256 I'd expect the length
of that loop to be somewhere on the order of 2^200+ values in length,
but I don't expect it to be perfect.
Sent via Deja.com http://www.deja.com/
Before you buy.
------------------------------
From: [EMAIL PROTECTED] (Scott Craver)
Crossposted-To: talk.politics.crypto,talk.politics.misc,alt.freespeech
Subject: Re: Crypto Export Restrictions
Date: 3 Nov 2000 20:22:43 GMT
Anthony Stephen Szopa <[EMAIL PROTECTED]> wrote:
>
>If you don't get it from reading the Help files you need to learn
>how to read. Many many people have read the Help files and ran
>the software and are using the software and they understand it all
>perfectly well.
We're not talking about how to _use_ the software, but
the specific algorithm it is based on.
If you want people to analyze your PRNG, output source
code or good pseudocode (no steps missing, no ambiguous
bits) for the PRNG part of the software.
>If you have some valid criticism of the software post it and support
>your position with facts.
Valid criticism: you won't provide a sufficiently readable
description of your algorithm.
Why don't you just _look_ at the way real PRNGs are described
in _Applied Cryptography_? Diagrams and source code are
provided which explain them unambiguously. People will use
them, rather than your system.
Valid criticism #2: a program requiring a user to futz around
(w/ a deck of cards, say) for fifteen minutes to generate a
crypto key is like a TV requiring a user to mess with a slide
rule for 15 minutes in order to change a channel.
Valid criticism #3: before people on sci.crypt corrected you,
you were calling your program a One-Time-Pad (which it is not.)
I suspect that if people on this group weren't here to keep you
honest, you'd have made all sorts of false claims about your
system.
>So far you are just a whiner who does not do his homework.
Speaking of homework, let me know if you want some good
exercises on permutation groups. It is math, you know.
-S
------------------------------
From: Simon Johnson <[EMAIL PROTECTED]>
Subject: Re: Microsoft's script encoder
Date: Fri, 03 Nov 2000 20:27:47 GMT
In article <8tv1oj$iv$[EMAIL PROTECTED]>,
"Lefty Louther" <[EMAIL PROTECTED]> wrote:
> Can you please be more specific ?
>
> Thank you,
> Lefty
>
> "Tom St Denis" <[EMAIL PROTECTED]> wrote in message
> news:8tv05b$n87$[EMAIL PROTECTED]...
> > In article <8turns$qbe$[EMAIL PROTECTED]>,
> > "Lefty Louther" <[EMAIL PROTECTED]> wrote:
> > > When i use microsoft's script encoder (screnc.exe) for
> > > string :
> > > response.write ("lakis")
> > > I get :
> > > #@~^IAAAAA==@#@&DnkwKx/?RS.kD+~`rVCVb/J*@#@&vwgAAA==^#~@
> > >
> > > Does anyone know what kind of cipher algorithm is it ?
> >
> > It most likely is not an encryption algorithm, perhaps it's a byte
code
> > (like java) stored using ASCII chars...
> >
> > Tom
> >
> >
> > Sent via Deja.com http://www.deja.com/
> > Before you buy.
>
>
Even if its an encryption algorithm, its pants. Look at the cipher-text
expansion :P
Hrm, 'AAAAA' - if this was generated randomly (which it should look
like it has) then the probability of this occuring would be one in
around a trillion. On the same line, 'A' is repeated three times
aswell, which has its own probability of occurance which is roughly
equal to one in 16 million. On top of this there are loads of pairs of
two identical letters in a string, which has its probability of one in
65536.
This points towards a pretty pathetic cipher, if you think this secure,
think again.
--
Hi, i'm the signuture virus,
help me spread by copying me into Signiture File
Sent via Deja.com http://www.deja.com/
Before you buy.
------------------------------
From: "Lefty Louther" <[EMAIL PROTECTED]>
Subject: Re: Microsoft's script encoder
Date: Fri, 3 Nov 2000 22:47:33 +0200
No i don't think it's secure.Microsoft sais that it's unsecure.
I think the first part is part of the checksum.
When i encode different data i get the same AAAAA.
It's not an encryption, it's an encoding.
I want to learn how it works.
If you have any idea please help me.
Thanks,
Lefty
"Simon Johnson" <[EMAIL PROTECTED]> wrote in message
news:8tv73q$trj$[EMAIL PROTECTED]...
> In article <8tv1oj$iv$[EMAIL PROTECTED]>,
> "Lefty Louther" <[EMAIL PROTECTED]> wrote:
> > Can you please be more specific ?
> >
> > Thank you,
> > Lefty
> >
> > "Tom St Denis" <[EMAIL PROTECTED]> wrote in message
> > news:8tv05b$n87$[EMAIL PROTECTED]...
> > > In article <8turns$qbe$[EMAIL PROTECTED]>,
> > > "Lefty Louther" <[EMAIL PROTECTED]> wrote:
> > > > When i use microsoft's script encoder (screnc.exe) for
> > > > string :
> > > > response.write ("lakis")
> > > > I get :
> > > > #@~^IAAAAA==@#@&DnkwKx/?RS.kD+~`rVCVb/J*@#@&vwgAAA==^#~@
> > > >
> > > > Does anyone know what kind of cipher algorithm is it ?
> > >
> > > It most likely is not an encryption algorithm, perhaps it's a byte
> code
> > > (like java) stored using ASCII chars...
> > >
> > > Tom
> > >
> > >
> > > Sent via Deja.com http://www.deja.com/
> > > Before you buy.
> >
> >
> Even if its an encryption algorithm, its pants. Look at the cipher-text
> expansion :P
>
> Hrm, 'AAAAA' - if this was generated randomly (which it should look
> like it has) then the probability of this occuring would be one in
> around a trillion. On the same line, 'A' is repeated three times
> aswell, which has its own probability of occurance which is roughly
> equal to one in 16 million. On top of this there are loads of pairs of
> two identical letters in a string, which has its probability of one in
> 65536.
>
> This points towards a pretty pathetic cipher, if you think this secure,
> think again.
>
>
> --
> Hi, i'm the signuture virus,
> help me spread by copying me into Signiture File
>
>
> Sent via Deja.com http://www.deja.com/
> Before you buy.
------------------------------
From: [EMAIL PROTECTED] (JPeschel)
Subject: Re: Calculating the redudancy of english?
Date: 03 Nov 2000 20:48:55 GMT
Douglas A. Gwyn writes:
>JPeschel wrote:
>> Simon Johnson [EMAIL PROTECTED] writes:
>> >How does one calculate the redudancy of english?
>> Use the index of coincidence.
>
>No.
>
>For a correct answer see Shannon's paper.
Oops.
Thanks, Doug.
I think this is the applicable paragraph by Shannon.
"The ratio of the entropy of a source to the maximum
value it could have while still restricted to the same
symbols will be called its relative entropy.
This is the maximum compression possible when we
encode into the same alphabet. One minus the relative
entropy is the redundancy. The redundancy of ordinary English,
not considering statistical structure over greater
distances than about eight letters, is roughly 50%.
This means that when we write English half of what we
write is determined by the structure of the language and
half is chosen freely. The figure 50% was found by
several independent methods which all gave results in
this neighborhood. One is by calculation of the entropy
of the approximations to English. A second method
is to delete a certain fraction of the letters from a
sample of English text and then let someone attempt to
restore them. If they can be restored when 50% are
deleted the redundancy must be greater than 50%. A
third method depends on certain known results in
cryptography."
I'm off to re-read <i>Finnegan's Wake</i> now. :-)
Joe
__________________________________________
Joe Peschel
D.O.E. SysWorks
http://members.aol.com/jpeschel/index.htm
__________________________________________
------------------------------
From: "David C. Barber" <[EMAIL PROTECTED]>
Subject: Re: how i decode this?
Date: Fri, 3 Nov 2000 13:56:32 -0700
If the lines are 61 characters starting with "M", then it is most likely
uuencoded. In uuencode, the first character is the line length ("M"=60)
with the data following. 60+1 character line lengths are the most common
size.
For more information on uuencode, find a Unix system and type "man
uuencode".
*David Barber*
"Douglas A. Gwyn" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
> Eduardo Hernandez wrote:
> > how i decode or decrypt this kind of messages???
> > MQ'(E<H8.=8"AKS*7C$$KTGXXF_-D:M+&![;'PY61C0<B$-?E1B.^XKPMT,:T
> > MI38V9-JN7+H/[C2^9*R1&X`4;HUTLE$7D4D].B7JPZMTA2Z?;U9,^N$C8_C8
> > ME?!/K?>7ZBM]H\OAPIPI+OR<S>::]>K<ESP$9RULS>)*[[@DAV:#LU\;+:'C
> > MQH#&RZW06I'F7I^>QHD[!(_\_?DPX%&I`Y@NV9MZ!\%JD)8#%&YML5L>VG[6
> > MCL^M[2!5+;[U\[?&[R%KO^T/&=V9,OV6-VI7G`K-Z&<-,.6_$VJZ&[#XE"6`
> > M`:G/;Q3+T]+K8Q3^+KYQGEU-.2@A\IM6_E9Y)+&G!QO<];U:5P4/OC,E$TU]
> > M`*@:H4DZVY?`B!&5%^OL_'O039X;>T[&K/U^7;E"&QPS$[.8R:[R:NI&)>/>
>
> You should discuss it with whoever created the messages.
> Note that these all start with M and use a limited character
> set. Probably it's a base-64 encoding similar to what MIME
> and uuencode use.
------------------------------
From: "Kristopher Johnson" <[EMAIL PROTECTED]>
Subject: Re: Calculating the redudancy of english?
Date: Fri, 03 Nov 2000 21:02:57 GMT
Dictionary entries aren't representative of "real-world" letter or word
frequencies.
-- Kris
"David C. Barber" <[EMAIL PROTECTED]> wrote in message
news:8ts7mu$1ifq$[EMAIL PROTECTED]...
> "Bill Unruh" <[EMAIL PROTECTED]> wrote in message
> news:8tq2bf$2dt$[EMAIL PROTECTED]...
> > In <8tkosd$84d$[EMAIL PROTECTED]> Simon Johnson
<[EMAIL PROTECTED]>
> writes:
> >
> > > How does one calculate the redudancy of english?
> >
> > Then you have to decide, are you going to take a typical passage (in
> > which many words occur far far far more frequently than others) or a
> > dictionary ( where all words occur equally-- once).
>
> What about a Dictionary with definitions (e.g. the Webster available at
> Project Gutenberg)? Would analysis there yield useful data?
>
> *David Barber*
>
>
>
------------------------------
From: Wei Dai <[EMAIL PROTECTED]>
Crossposted-To: comp.compression
Subject: Crypto++ 4.0 released, and updated crypto benchmarks
Date: Fri, 3 Nov 2000 13:54:56 -0800
[This announcement is cross posted to comp.compression because Crypto++
contains zlib-compatible compression/decompression features.]
Crypto++ 4.0 has just been released. You can find download instructions
for Crypto++ on its home page at http://www.cryptopp.com.
Updated benchmarks are available at
http://www.weidai.com/benchmarks.html.
Crypto++ is a free C++ class library of cryptographic schemes. Changes
made in version 4.0 include:
- added Skipjack, CAST-256, Panama, SHA-2 (SHA-256, SHA-384, and
SHA-512), and XTR-DH
- added a faster variant of Rabin's Information Dispersal Algorithm
(IDA)
- added class wrappers for these operating system features:
- high resolution timers on Windows, Unix, and MacOS
- Berkeley and Windows style sockets
- Windows named pipes
- /dev/random and /dev/urandom on Linux and FreeBSD
- Microsoft's CryptGenRandom on Windows
- added support for SEC 1 elliptic curve key format and compressed
points
- added support for X.509 public key format (subjectPublicKeyInfo) for
RSA, DSA, and elliptic curves
- added support for DER and OpenPGP signature format for DSA
- added support for ZLIB compressed data format (RFC 1950)
- changed elliptic curve encryption to use ECIES (as defined in SEC 1)
- changed MARS key schedule to reflect the latest specification
- changed BufferedTransformation interface to support multiple channels
and messages
- changed CAST and SHA-1 implementations to use public domain source
code
- fixed bug in StringSource
- optmized multi-precision integer code for better performance
------------------------------
From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Re: Q: Computations in a Galois Field
Date: Fri, 03 Nov 2000 23:16:25 +0100
Tom St Denis wrote:
>
> Mok-Kong Shen <[EMAIL PROTECTED]> wrote:
> >
> > Tom St Denis wrote:
> > >
> > > Mok-Kong Shen <[EMAIL PROTECTED]> wrote:
> > > >
> > > > Dumb question: For GF(2^m) with m sufficiently large, are
> > > > there specific tricks in programming that could speed up
> > > > multiplication/division? Thanks.
> > >
> > > I believe you meant GF(2)^m as in a polynomial basis with binary
> > > components. I keep getting mixed up with this as well (although
> people
> > > have explained it...)
> >
> > No. I mean exactly GF(2^m), the finite field of order 2^m
> > (a Galois field that is known to exist). I don't know
> > the mathematical object you referred to or its relationship
> > to GF(2^m).
>
> Um, cuz GF(p) is known as "a finite field with a prime p as a
> modulus". GF(2)^n refers to polynomials of degree 'n' with
> coefficients in GF(2).
I asked a question about GF(2^m), why did you continue
to tell me something about something else???
M. K. Shen
------------------------------
From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Re: Q: Computations in a Galois Field
Date: Fri, 03 Nov 2000 23:20:54 +0100
Mike Rosing wrote:
>
> Mok-Kong Shen wrote:
> >
> > Dumb question: For GF(2^m) with m sufficiently large, are
> > there specific tricks in programming that could speed up
> > multiplication/division? Thanks.
>
> Yes, there are great many tricks. One major trick is the choice
> of basis. For some field sizes (i.e. depending on m) you can
> get a comparable time for multiply and divide where for m+1 you
> find the divide routine takes 3 times longer than a multiply.
> The use of trinomials makes multiplication faster too.
>
> When m gets very large, say > 1000, you can start using FFT
> methods. I haven't had to program that myself, but it's well
> described in the literature.
I am yet ignorant of literature that gives much details
on comuputational aspects and in particular those points
that you mentioned. Could you please give a couple of
references? Thanks.
M. K. Shen
------------------------------
Subject: example code for your use
From: [EMAIL PROTECTED] (Kenneth Lantrip)
Crossposted-To: comp.lang.c,comp.lang.c.moderated
Date: 03 Nov 2000 23:00:27 GMT
I have written a nice (I think so) little program in C to help me learn the use
of the language. I'm not sure if it's legal to post an encryption algorithm
that uses a 128 bit key. I'd like to offer it to whoever wants to see the code
so that they might can use parts of it or learn from it or whatever.
Below is a text mode screen shot of the program. It is a simple IDEA
calculator that takes an input and a key and makes an output, or an output and
key to find an input. The cursor is moved by the arrow keys and the space bar
toggles the value of the bit or nibble it sits on. F11 saves and F12 loads a
saved state. The program is of no real use, other than educational values, as
the key space and avalanche properties of the IDEA algorithm is too great to be
comprehended by the human mind. It is little more than a crypto-analysis tool
for the algorithm.
If you would like to look over the source code, e-mail me and I'll send it to
ya if ya live in the USA. I'm not sure export laws allow 128 bit crypto
algorithms to be exported. However, I can point you in the right direction to
where you can get the source for the IDEA algorithm that was used in the
program below. I can still send you the main() function.
I realize that these stupid crypto laws are a direct infringement of my first
amendment constitutional right!
_______________________________________________________________________________
Input: 00 01 02 03 04 05 06 07
00000000 00000001 00000010 00000011 00000100 00000101 00000110 00000111
Using Key: 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F 10
00000001 00000010 00000011 00000100 00000101 00000110 00000111 00001000
00001001 00001010 00001011 00001100 00001101 00001110 00001111 00010000
Encrypt Subkey:
0000000100000010 0000001100000100 0000010100000110 0000011100001000
0000100100001010 0000101100001100 0000110100001110 0000111100010000
0000100000001010 0000110000001110 0001000000010010 0001010000010110
0001100000011010 0001110000011110 0010000000000010 0000010000000110
0001110000100000 0010010000101000 0010110000110000 0011010000111000
0011110001000000 0000010000001000 0000110000010000 0001010000011000
0101000001011000 0110000001101000 0111000001111000 1000000000001000
0001000000011000 0010000000101000 0011000000111000 0100000001001000
1101000011100000 1111000100000000 0001000000100000 0011000001000000
0101000001100000 0111000010000000 1001000010100000 1011000011000000
0000000000100000 0100000001100000 1000000010100000 1100000011100001
0000000100100001 0100000101100001 1000000110100001 1100000111100010
1100000100000001 0100000110000001 1100001000000010 0100001010000010
Output: 59 4D BB A4 98 27 D4 78
01011001 01001101 10111011 10100100 10011000 00100111 11010100 01111000
_______________________________________________________________________________
--
comp.lang.c.moderated - moderation address: [EMAIL PROTECTED]
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and sci.crypt) via:
Internet: [EMAIL PROTECTED]
End of Cryptography-Digest Digest
******************************