Cryptography-Digest Digest #463, Volume #13 Sat, 13 Jan 01 05:13:00 EST
Contents:
Re: Different DES (John Myre)
Re: 16bit collision resistance hash function? (John Myre)
Re: 16bit collision resistance hash function? (Jim Gillogly)
Re: Electronic resources for cryptology? (RoceKiller)
On cryptographic proofs and their (lack) of concreteness ("Joseph Ashwood")
Documentation on encrypting routines (RoceKiller)
that security proof for ECDSA ?? (David A Molnar)
Re: that security proof for ECDSA ?? (Paul Rubin)
A Small Challnge ("rosi")
Security proof (Benjamin Goldberg)
Re: A Small Challnge (Mok-Kong Shen)
Re: On cryptographic proofs and their (lack) of concreteness (Mok-Kong Shen)
Re: Need of very simple algorithms? (Shawn Willden)
Re: Need of very simple algorithms? (Shawn Willden)
----------------------------------------------------------------------------
From: John Myre <[EMAIL PROTECTED]>
Subject: Re: Different DES
Date: Fri, 12 Jan 2001 15:09:20 -0700
I was going to apologize profusely for the wrong URL but
it appears that NIST has just now moved and redesigned
their FIPS site. The DES document is now:
http://csrc.nist.gov/publications/fips/fip46-3/fips46-3.pdf
The FIPS page is:
http://csrc.nist.gov/publications/fips/index.html
Oh, well. I guess I'll go fix my bookmarks now.
JM
------------------------------
From: John Myre <[EMAIL PROTECTED]>
Subject: Re: 16bit collision resistance hash function?
Date: Fri, 12 Jan 2001 15:18:18 -0700
"[Basic]" wrote:
<snip>
> In fact I calculate the hash value over a 64bit long value and my problem is
> that while transmitting the last few bits can get lost. As the 16bit hash
> value is also transmitted the receiver should be able to reconstruct the
> last few (up to ~25) bits by brute forcing and setting up a list of possible
> solutions. This list should be as short as possible.
This is starting to sound like a failure to communicate
the requirements. The question you actually posted has
been answered. If what you really want is to solve a
real problem, the best way to proceed is to describe
the problem. It is possible that a "hash" isn't even
the right tool in the first place.
JM
------------------------------
From: Jim Gillogly <[EMAIL PROTECTED]>
Subject: Re: 16bit collision resistance hash function?
Date: Fri, 12 Jan 2001 14:23:02 -0800
"[Basic]" wrote:
> In fact I calculate the hash value over a 64bit long value and my problem is
> that while transmitting the last few bits can get lost. As the 16bit hash
> value is also transmitted the receiver should be able to reconstruct the
> last few (up to ~25) bits by brute forcing and setting up a list of possible
> solutions. This list should be as short as possible.
Then perhaps you should be looking at "error-correcting codes" rather
than hashes.
--
Jim Gillogly
Sterday, 21 Afteryule S.R. 2001, 22:22
12.19.7.15.17, 9 Caban 20 Kankin, Second Lord of Night
------------------------------
From: RoceKiller <[EMAIL PROTECTED]>
Subject: Re: Electronic resources for cryptology?
Date: Fri, 12 Jan 2001 23:30:01 +0100
On Sat, 6 Jan 2001 11:29:45 -0000,
"Mark Hellewell" <[EMAIL PROTECTED]>
used 20 lines to tell us:
>"Richard Cavell" <[EMAIL PROTECTED]> wrote in message
>news:[EMAIL PROTECTED]...
>>It's difficult to buy specialist books in Australia.
>>The FAQ lists two websites which have both disappeared.
>>Does anyone have any recommended online cryptology resources?
>There are tons of resources, all you have to do is search for them.
Right, but there's a lot of junk too, and it's hard to find the good
stuff, between the bad stuff.
Greetings
RoceKiller
--
{E-Mail: RoceKiller(at)trashcan.dk UIN: #36155647 IRC: #RK at Undernet}
"Facts oph�rer ikke med at eksistere, fordi man ignorerer dem."
Aldous Huxley
------------------------------
From: "Joseph Ashwood" <[EMAIL PROTECTED]>
Subject: On cryptographic proofs and their (lack) of concreteness
Date: Fri, 12 Jan 2001 15:18:31 -0800
Recently on sci.crypt there has been a lot of discussion regarding
mathematical proofs, and their validity. These are my thoughts, and
hopefully some answers for some people.
(Almost) Every mathematical proof makes some assumptions. These assumptions
range in assuredness from the mundane (1+1=2), to things that we know are
fundamentally flawed but we use regardless (the random oracle model). Each
of these has varying uses. The main use of these security proofs is in
reducing the specifics that must be examined.
The common assumptions are things like:
The RSA problem is hard
The Discrete Log problem is hard
SHA-1 acts as a random oracle
Given a short list of these assumptions it is possible to make it far easier
to determine if the algorithm in question suits the needs of the situation.
For most purposes, SHA-1 is effectively a Random Oracle, and the RSA problem
is hard. However if the requirements are to have a public key of only 500
bits, and since 512-bit factoring has occured, the RSA problem hardness
assumption is violated.
Proof like this, proofs that define more sharply the requirements for
security, are of great use and interest to those who depend on these
primitives. It not only allows us to judge primitives faster and with better
accuracy, but for maintainance it is at least, perhaps more, helpful. Proofs
about the security of protocols relying on certain basic assumptions become
ever more important. When I finish a protocol I generally hand off the
maintainance of it to someone less capable. Being able to make statements
like, "You need only worry about the Discrete Log problem at 1024 bits and
the strength of SHA-1" greatly reduces the level of expertise needed by that
person.
For cryptanalysis it is also extremely useful. If a proof can be built that
problem X relies only on the strength of it's 2 assumptions (DL-1024 and
SHA-1), then a cryptanalyst can determine that avenues other than attacking
SHA-1 and DL-1024 don't even need to be considered, and real work on the
problem can begin much sooner, with fewer false starts, and a much better
chance for real results.
While the proofs are not of the form, therefore this is provably secure,
they are of great use, and the maintainance and examination of the
primitives and protocols is far less costly. I depend on this kind of proof
every day, some are obvious, some are not, but if my judgement is ever
called into question, I can justify myself.
Joe
------------------------------
From: RoceKiller <[EMAIL PROTECTED]>
Subject: Documentation on encrypting routines
Date: Sat, 13 Jan 2001 00:45:17 +0100
Where do I find documentations on diffrent encrypting routines?
Greetings
RoceKiller
--
{E-Mail: RoceKiller(at)trashcan.dk UIN: #36155647 IRC: #RK at Undernet}
"Facts oph�rer ikke med at eksistere, fordi man ignorerer dem."
Aldous Huxley
------------------------------
From: David A Molnar <[EMAIL PROTECTED]>
Subject: that security proof for ECDSA ??
Date: 13 Jan 2001 00:03:59 GMT
This looks like it *may* be the security proof referred to by Don Johnson
in a previous thread:
http://eprint.iacr.org/2001/003/
Separating Decision Diffie-Hellman from Diffie-Hellman in
cryptographic groups
Antoine Joux and Kim Nguyen
Abstract. In many cases, the security of a cryptographic scheme based
on Diffie--Hellman does in fact rely on the hardness of the
Diffie--Hellman Decision problem. In this paper, we show that the
hardness of Decision Diffie--Hellman is a much stronger hypothesis
than the hardness of the regular Diffie--Hellman problem. Indeed, we
describe a reasonably looking cryptographic group where Decision
Diffie--Hellman is easy while Diffie--Hellman is equivalent to a --
presumably hard -- Discrete Logarithm Problem. This shows that care
should be taken when dealing with Decision Diffie--Hellman, since its
security cannot be taken for granted.
Category / Keywords. public-key cryptography / number theory, elliptic
curve
Date: received 9 Jan 2001
Contact author: [EMAIL PROTECTED]
I say this because it concerns elliptic curves; I have not yet read it and
don't know how it matches with the remarks about a proof which "applies to
ECDSA but not to DSA."
Thanks,
-David
------------------------------
From: Paul Rubin <[EMAIL PROTECTED]>
Subject: Re: that security proof for ECDSA ??
Date: 12 Jan 2001 18:07:38 -0800
David A Molnar <[EMAIL PROTECTED]> writes:
> This looks like it *may* be the security proof referred to by Don Johnson
> in a previous thread:
Looks completely different from what I can tell.
------------------------------
From: "rosi" <[EMAIL PROTECTED]>
Crossposted-To: sci.math,comp.theory
Subject: A Small Challnge
Date: Sat, 13 Jan 2001 00:31:10 -0500
Here is a little challenge that pertains to "concrete" computational
complexity as well as to cryptography. In specific, it is associated with
a concept called 'Quasi-Public' (QP).
This is a call for the 'demonstration' of the existence of, or the
concrete design of, any cryptographic scheme that may sit with the
_INFORMAL_ notion of QP.
A more formal treatment of QP will follow, but I think the notion
in an informal form may have a wider range of audiences to allow
potentially a larger variety of schemes. Anything that carries the
notion:
"not really public even though made so"
should count. People who are not really engaged in the cryptographic
disciplines, may find the following helpful:
In cryptography, a particular type of schemes are referred
to as 'asymmetric'. 'asymmetric' basically means that the
holder of the decryption key has a level of knowledge about
the cryptographic keys used different from that of those
who do not hold the decryption key. Conventionally, this
asymmetric scheme may also be known as public-key scheme.
Here it means that the encryption key "can" be made public
and that even though an attacker having the publicly
available encryption key and a copy of the ciphered text,
he "cannot" feasibly obtain the original text, "nor" of
course can he feasibly obtain the decryption key from the
public encryption key.
A QP key is an asymmetric cryptographic key with the
following special feature: from the viewpoint of the holder
of the secret decryption key, the QP encryption key (which
is made public) is not really made public. In other words,
the understanding and viewpoint of the encryption key is
different between the holder(s) of the secret decryption key
and any other in the general public which includes potential
attackers on the cryptographic scheme.
So, a re-visit to the notion of 'asymmetry': in the public-
key scheme, there is a knowledge difference between the holder
of the secret decryption key and the general public on the
secret decryption key (i.e. the holder knows everything about
the decryption key but the general public do not), while in QP,
there is in addition a knowledge difference about the publicly
known encryption key as well.
(With regard to secure schemes, we certainly would not want such
difference to be irrelevant to security)
Any idea, whether practical or not, that even remotely fits the notion
will be welcomed. So here, virtually anything goes! And let us hear from
you!
Now, slightly more formal.
QP in two flavours.
1. For a single encryption key, there can be more than one
corresponding decryption keys that decrypt 'differently' but
unambiguously.
The word "differently" has the following, more precise meaning:
different decipherings gain different pieces of
information about the plaintext (versus getting
different semantics from a same piece of information).
Denote E as an encryption key and D[1], D[2], ..., D[n] as a
set of corresponding decryption keys satisfying:
For any message m, i != j only if
D[i](E(m)) != D[j](E(m)) for sufficiently
many of all the values m, the (plaintext)
message, can take on.
For convenience, 'sufficiently many of' can be 'close to a half
of'.
2. There can be more than one corresponding encryption keys to a
single decryption key, yet the encrypted text (ciphertext), by
any of the multitude of different encryption keys, decrypts (by
this said decryption key) uniquely to the plaintext.
Denote D as a decryption key and E[1], E[2], ..., E[n] as a
set of corresponding encryption keys satisfying:
D(E[i](m)) = D(E[j](m)) = m
for any 1<=i,j<=n and any m, where E[i](m)=E[j](m) iff i=j.
To avoid terrific jokes and extraordinary sense of humour frequently
exhibited in sci.crypt, I go redundant One Time More (Oh, no! Not OTP!):
n=1 should be an exception rather than the norm!
Thank you so very much.
--- (My Signature)
P.S.
Have a friend or know one who likes mental exercises and little
challenges? Pass this on to him and he may enjoy!
One is not limited to any single cryptographic technique. Any tweak
can be applied for a realization of QP.
Of course, nothing should prevent you from combining 1 and 2 in some
sense.
And do not forget the computational complexity part of the story! (Agree
that one has to have a scheme first before talking about its complexity)
Good luck!
------------------------------
From: Benjamin Goldberg <[EMAIL PROTECTED]>
Subject: Security proof
Date: Sat, 13 Jan 2001 07:31:27 GMT
I want to try and prove my hypercrypt cipher secure under the assumption
that the byte pair mixing function is a Strong Psuedo-Random
Permutation. To do this, I want to first attempt to show that a reduced
blocksize version is secure, and then show that expanding it does not
weaken its strength.
I informally define a Strong Psuedo Random Permutation as a block cipher
which is secure against an adaptive chosen plaintext and ciphertext
attack.
Notation:
Let M be a SPRP, and M(K) is a particular 2N bit permutation.
Let a, b, c, d each be 1/4 of the 4N bit plaintext.
Let w, x, y, z each be an N bit temp variable
Let e, f, g, h each be 1/4 of the 4N bit ciphertext.
The reduced size cipher is as follows:
(w, x) = M(K0)(a, b)
(y, z) = M(K1)(c, d)
(e, f) = M(K2)(w, y)
(g, h) = M(K3)(x, z)
How do I go about proving that this construct is also an SPRP?
I think it can be done... but I'm not sure how.
I think I should mention that there are some *possible* weak keys, but
I'm going to assume that they won't occur in the actual implementation.
Here's an example:
Suppose that there exists some Ka, Kb, such that M(Ka) = M(Kb)^(-1);
Then, if a=c, b=d, K0=K1=Ka, and K2=K3=Kb, then e=g=a, and f=h=b.
--
Power interrupts. Uninterruptable power interrupts absolutely.
[Stolen from Vincent Seifert's web page]
------------------------------
From: Mok-Kong Shen <[EMAIL PROTECTED]>
Crossposted-To: sci.math,comp.theory
Subject: Re: A Small Challnge
Date: Sat, 13 Jan 2001 09:13:34 +0100
rosi wrote:
>
[snip]
> A QP key is an asymmetric cryptographic key with the
> following special feature: from the viewpoint of the holder
> of the secret decryption key, the QP encryption key (which
> is made public) is not really made public. In other words,
> the understanding and viewpoint of the encryption key is
> different between the holder(s) of the secret decryption key
> and any other in the general public which includes potential
> attackers on the cryptographic scheme.
>
> So, a re-visit to the notion of 'asymmetry': in the public-
> key scheme, there is a knowledge difference between the holder
> of the secret decryption key and the general public on the
> secret decryption key (i.e. the holder knows everything about
> the decryption key but the general public do not), while in QP,
> there is in addition a knowledge difference about the publicly
> known encryption key as well.
Very probably I misunderstood. Do you mean that the
encryption key is not known to the general public but only
to a selected subset of people, including the case of only
one person (a determined single sender)? But then you have
given up the benefit of PK and could use a symmetric
encryption system just as well, don't you?
M. K. Shen
------------------------------
From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Re: On cryptographic proofs and their (lack) of concreteness
Date: Sat, 13 Jan 2001 09:46:35 +0100
Joseph Ashwood wrote:
>
[snip]
> While the proofs are not of the form, therefore this is provably secure,
> they are of great use, and the maintainance and examination of the
> primitives and protocols is far less costly. I depend on this kind of proof
> every day, some are obvious, some are not, but if my judgement is ever
> called into question, I can justify myself.
I believe you are evidently right. The only thing one
should always guard against is saying 'This is provably
secure' instead of 'This is provably secure under the
assumptions ......', for some people would unconsciously
ignore the fact that there are generally certain assumptions
underlying a proof and that these assumptions could be
false or considered to be insufficiently secure to be relied
upon in given practical situations.
M. K. Shen
------------------------------
From: Shawn Willden <[EMAIL PROTECTED]>
Subject: Re: Need of very simple algorithms?
Date: Sat, 13 Jan 2001 01:58:18 -0700
Paul Rubin wrote:
> Shawn Willden <[EMAIL PROTECTED]> writes:
> > I don't know about that particular microprocessor, but many low-end
> > smart card microprocessors cost well under $1, and they're capable of
> > performing AES operations.
>
> $1 is a lot of money for a low end device. If my company wants to
> ship 100 million smart cards, and AES needs a $1 processor but
> Skipjack needs a 35 cent processor, I'm going to have an awful hard
> time convincing the CEO to give up $65 million from the company's
> bottom line in exchange for some abstract theoretical security
> improvement.
I'm not arguing that you should pay two or three times as much for a
security increase that is irrelevant. I'm really arguing that using weaker
security won't save you any money.
For small volumes, the most important cost factor is going to be whether or
not the device is available off the shelf, so that you're not footing all
of the manufacturing set-up cost. For example, there are currently a large
number of inexpensive chips that implement 3DES in ROM. Most smart card
applications could get along just fine with DES, but the cheap chips are
the high-volume chips and they're 3DES.
For large volumes, the most important cost factor is the number of gates,
which translates into silicon size and density. For 100 million devices
you're going to be better off implementing everything you can in hardware,
rather than in software. A device with AES in silicon will cost less than
a device with a weaker algorithm in software. There won't really be a
substantial difference in cost between an AES hardware implementation and a
hardware implementation of something else, because even with relatively
low-density masks the die size of both will be very small.
And if all that weren't enough, consider that your unit cost will probably
be dominated by other costs anyway. The cost of the chip itself is a
fairly trivial piece of the cost of deploying a smart card. Even with very
high-end, expensive chips, in large volumes the printing, embedding
personalization, packaging and distribution tend to cost more than the
chips do. For comparison, consider that the financial industry figures it
costs between $5 and $8 to deliver a printed, embossed credit card with a
personalized magnetic strip and a hologram to a card holder.
IMO, economies of scale favor the more standard algorithm as long as it's
not excessively expensive, and AES is small, fast and cheap enough to be
used everywhere, even if the security it provides is overkill.
Shawn.
------------------------------
From: Shawn Willden <[EMAIL PROTECTED]>
Subject: Re: Need of very simple algorithms?
Date: Sat, 13 Jan 2001 02:02:51 -0700
Mok-Kong Shen wrote:
> I meant those text messages that are sent by handy users.
> (Sorry, if the acronym I used is not universally accepted.)
> A normal handy user doesn't carry any computing device
> with him for running sophisticated encryption algorithms.
> That's the problem.
GSM cellphones carrying smart card chips that are perfectly capable of
implementing AES, even they currently don't. Many of them also have
cryptographic coprocessors that allow them to implement public key crypto.
There is no problem here. Further, the phones themselves have much more
powerful microprocessors which could also easily run sophisticated crypto,
although they don't have any sort of secure key storage.
Shawn.
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list by posting to sci.crypt.
End of Cryptography-Digest Digest
******************************