Cryptography-Digest Digest #815, Volume #13       Tue, 6 Mar 01 05:13:00 EST

Contents:
  Thank You Everyone! ([EMAIL PROTECTED])
  Re: Monty Hall problem (was Re: philosophical question?) (Shawn Willden)
  Re: One-time Pad really unbreakable? (John Savard)
  What is SRT ? ("Marc")
  Re: Super strong crypto ("Douglas A. Gwyn")
  Re: OT: Legitimacy of Governmental Power  (Was: Re: => FBI easily crack  ...?) (Paul 
Crowley)
  Re: How good is the KeeLoq algorithm? (Paul Crowley)
  Re: Thank You Everyone! (Paul Rubin)
  Re: How good is the KeeLoq algorithm? ("r.e.s.")
  Re: => FBI easily cracks encryption ...? ("Mxsmanic")
  Re: passphrase question (Harri Haanpaa)
  Re: One-time Pad really unbreakable? ("Mxsmanic")
  Re: Crypto security of pseudo-random sequences (Mok-Kong Shen)
  Re: Super strong crypto ("Bryan Olson")
  Re: How good is the KeeLoq algorithm? ("Jakob Jonsson")
  On encryption through bit permutations (Mok-Kong Shen)
  Re: What is SRT ? (Malte Borcherding)
  Re: What is SRT ? (Malte Borcherding)
  Re: Monty Hall problem (was Re: philosophical question?) (Joe H. Acker)

----------------------------------------------------------------------------

From: [EMAIL PROTECTED]
Subject: Thank You Everyone!
Date: Tue, 06 Mar 2001 04:57:14 GMT

Hello Everyone,

I just wanted to thank everyone who posts here.  Being a complete
newby to this type of work, I'm learning something daily from all your
posts.  I was injured at work (I was an Emergency Medical Technician)
and because of it, have had to realign my work type.  I'd rather use
brains instead of brawn anyday!  But, once again I thank everyone for
their support for us newbys out here and those of us just learning the
basics.

Thanks Again,

George

P.S.  Feel free to e-mail me with any suggestions or comments.  All
are welcome.

------------------------------

From: Shawn Willden <[EMAIL PROTECTED]>
Subject: Re: Monty Hall problem (was Re: philosophical question?)
Crossposted-To: sci.crypt.random-numbers,de.sci.informatik.misc,sci.math
Date: Mon, 5 Mar 2001 22:15:31 -0700

Benjamin Goldberg wrote:

> Shawn Willden wrote:
> [snip]
> >  int carPos = r.nextInt(3);
> >  int choice = r.nextInt(3);
> 
> I'm not going to comment on anything else, but nextInt(3) returns 3
> random bits, or a number in the range 0..7.  To get an unbiased int in
> the range 0..2, you have to write your own ranmod type function.

No, you're thinking of Random.next(int bits).  Random.nextInt(int n) 
"Returns a pseudorandom, uniformly distributed int value between 0 
(inclusive) and the specified value (exclusive), drawn from this random 
number generator's sequence."

Check out:

http://java.sun.com/j2se/1.3/docs/api/java/util/Random.html#next(int)

and

http://java.sun.com/j2se/1.3/docs/api/java/util/Random.html#nextInt(int)

for further details.

Shawn.

------------------------------

From: [EMAIL PROTECTED] (John Savard)
Subject: Re: One-time Pad really unbreakable?
Date: Tue, 06 Mar 2001 05:19:00 GMT

On Tue, 06 Mar 2001 03:13:40 GMT, [EMAIL PROTECTED] (Steven Smolinski)
wrote, in part:

>If you can break a one-time pad if you get two ciphertexts made with the
>same key, why can't you divide one ciphertext in half and apply the same
>analysis?

Well, the one time pad uses a key as long as the ciphertext. So no
part of that key is used twice. Since the whole key is random, the
second half of that key has no relationship to the first half of the
key.

If you use the same key on two ciphertexts, that means the part of
that key corresponding to the shorter of the two messages is used
twice.

John Savard
http://home.ecn.ab.ca/~jsavard/crypto.htm

------------------------------

From: "Marc" <[EMAIL PROTECTED]>
Crossposted-To: alt.computer.security,comp.security
Subject: What is SRT ?
Date: Tue, 6 Mar 2001 19:18:52 +1300

Hi,

I'm researching a E-commerce package which says it uses SRT to secure the
web browser
connection to the server.

I have found that SRT appears to be a Java implementation of SSL, to enable
128bit encryption outside of US. Also optimised to E Banking.

What I'm trying to find out is who did it, and has it been reviewed by the
wider
internet community. Other attempts to "optimise" SSL have resulted in it's
being
broken.

Anyone know about this product!

Thanks
Marc




------------------------------

From: "Douglas A. Gwyn" <[EMAIL PROTECTED]>
Subject: Re: Super strong crypto
Date: Tue, 06 Mar 2001 06:33:16 GMT

David Wagner wrote:
> If lack of known attacks is our criteria, we don't need new systems.

No, you missed the point.  There is *no* possible attack against
the phase 3 straw man in the classes noted, which include those
that are usually the most promising avenues for cryptanalysis.
The space of all possible cryptanalytic attacks (under the standard
scenario as previously described) can conceptually be covered
by a handful of such general classes, and if evolution of the
design eventually blocks every one of those classes, then that
would reach the ultimate goal (i.e., a practical system immune to
*unknown* specific cryptanalytic attacks).  I've addressed the
historically most important classes first.  The next class would
be just about the last needed to complete the story; it involves
chaining of the shared information between adjacent blocks
(portion of PT of one block used in key in next block, also same
"IV" mask in each block) in conjunction with known unmasked PT
(all-0 is an acceptable assumption) to uncover some of the shared
information.  A detailed method for that would depend on the
specific block cipher (the only requirement so far is that that
cipher mixes well).  This is where one really needs a good theory
of the way that system structure interacts with information, in
particular how to compute a lower bound on the expected work factor
for the solution of such a problem.  (The case for unknown unmasked
PT would be harder, involving information statistics.)  Looking
just at the "information content" without consideration of how
much work is required to extract the information is a waste of
time (unless it shows extraction to be impossible, which is not
the case here).  Is there a well-developed theory into which we
could plug the problem parameters and turn the crank to get the
lower bound?  (I'm not aware that any have been published.)

> ... What is our criteria for success, and how do we gain
> confidence that the new proposal is any better than existing
> techniques?  In the absence of any _proof_ of security (which
> we do not at present have), this seems to be the part that has
> to be justified quite carefully.

One could concoct proofs of the specific security claims I have
made so far; I'm not doing that here because once I see that the
requisite property is in fact attained, I'm more interested in
working on the next phase than in filling in academic details.
I've indicated above what the most important remaining question
is for assessing the "super strength" of the straw-man design;
an investigation of that might discover another class of
vulnerability and suggest a way to deal with it, which would
pretty much conclude the structural design.

------------------------------

Crossposted-To: alt.security.pgp,talk.politics.crypto
Subject: Re: OT: Legitimacy of Governmental Power  (Was: Re: => FBI easily crack  ...?)
From: Paul Crowley <[EMAIL PROTECTED]>
Date: Tue, 06 Mar 2001 06:32:33 GMT

Vince Adams <[EMAIL PROTECTED]> writes:
> How do you say it in the UK?  Go bugger yourself wanker <g>.

Use of British insults is a more subtle art than it might seem and
should not be attempted by the uninitiated.  You big pillock.
-- 
  __
\/ o\ [EMAIL PROTECTED]
/\__/ http://www.cluefactory.org.uk/paul/

------------------------------

Subject: Re: How good is the KeeLoq algorithm?
From: Paul Crowley <[EMAIL PROTECTED]>
Date: Tue, 06 Mar 2001 06:32:33 GMT

"Simon Johnson" <[EMAIL PROTECTED]> writes:

> > Why can't they use a standard algorithm such as DES or RC4 ???
> > Sounds like the russian car mafia should have a look at that :-))
> 
> RC4 is not an official standard as far as I am aware.

There's an RFC that describes it, under the name "ARCFOUR".
-- 
  __
\/ o\ [EMAIL PROTECTED]
/\__/ http://www.cluefactory.org.uk/paul/

------------------------------

From: Paul Rubin <[EMAIL PROTECTED]>
Subject: Re: Thank You Everyone!
Date: 05 Mar 2001 22:47:17 -0800

[EMAIL PROTECTED] writes:
> I just wanted to thank everyone who posts here.  Being a complete
> newby to this type of work, I'm learning something daily from all your
> posts. 

Me too.  Thanks to Anthony Szopa, Dave Scott, and Monty Hall, I've
learned to use a kill file.  Thanks guys!

------------------------------

From: "r.e.s." <[EMAIL PROTECTED]>
Subject: Re: How good is the KeeLoq algorithm?
Date: Mon, 5 Mar 2001 23:21:40 -0800


"Paul Crowley" wrote ...
| "Simon Johnson" writes:
| > RC4 is not an official standard as far as I am aware.
|
| There's an RFC that describes it, under the name "ARCFOUR".

Where can that be found?
(Web searches came up empty.)

--r.e.s.



------------------------------

From: "Mxsmanic" <[EMAIL PROTECTED]>
Crossposted-To: alt.security.pgp,talk.politics.crypto
Subject: Re: => FBI easily cracks encryption ...?
Date: Tue, 06 Mar 2001 08:34:14 GMT

"Frodo" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...

> The same number as your "local cops always
> getting into trouble".

How often is that?

> Sorry, that's a secret.

Then how would you know about it?



------------------------------

From: Harri Haanpaa <[EMAIL PROTECTED]>
Crossposted-To: alt.security.pgp
Subject: Re: passphrase question
Date: 06 Mar 2001 10:57:12 +0200

Anonymous <[EMAIL PROTECTED]> writes:

> I was thinking about using a decryption passphrase for software like PGP
> and the like that would consist of a very long string of characters like:
> 
> ......aaaaaaaaaa$$$$$$$$$$$fffffffffffDDDDDDD5555

After having thought about how to create a passphrase, I decided to
settle for random characters. After all, a passphrase shouldn't be
very long, or it will take a long time to type.

Also I decided against using special characters or capital
letters. The location of special characters may vary, and some special
characters and all capital letters take at least two keypresses, which
is inefficient.

That left me with the English alphabet, a..z and the numbers 0..9.
Conveniently, that is a total of 36 characters, easily generated by
dice (since obviously I wouldn't want to trust a pseudo-random number
generator).

Just create as many characters as you want by rolling two dice.

       First die
     1 2 3 4 5 6

2 1: a b c d e f
n 2: g h i j k l
d 3: m n o p q r
  4: s t u v w x
d 5: y z 0 1 2 3
i 6: 4 5 6 7 8 9
e

In this way, each characters gives a bit more than 5 bits of
entropy. So to get, say, 75 bits of security, you could create 15 random
characters. Then, of course, you must memorize them. But even that isn't
as hard as you might think. Take, for example, the sequence I just generated:

3 9 4 i s 0 p 0 q w t f 1 6 x 2

Don't try to memorize that as a string of characters, but try to make some
sense of it. How about this:

394 is zero p, zero q. What the f..??? sixteen times two.

or

h d 4 1 c m l 9 f j 0 x r 1 8 y

which could be "Harley-Davidson, 41 centimeters".. hm, right now I
can't think of anything for the "l 9 f j 0" part, but the "x r 18 y"
could be "X-rated, 18 years". I don't think you have to invent the
short cut right away; it'll come to you as you use the passphrase a
bit.

Comparison with Diceware: the passphrases generated with this method
are shorter. From 10 rolls of a die, Diceware generates two English
words, but this method generates only 5 random characters. So they are
faster to type in. Of course, the passphrases generated with Diceware
may be easier to remember, since they consist of real English words;
however, they are also longer, so there is more to memorize.

I can't take credit for inventing this method, but I don't remember
where I saw it. Somewhere on the WWW, I presume.

Harri H.

------------------------------

From: "Mxsmanic" <[EMAIL PROTECTED]>
Subject: Re: One-time Pad really unbreakable?
Date: Tue, 06 Mar 2001 09:16:53 GMT

"Steven Smolinski" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...

> If you can break a one-time pad if you get two
> ciphertexts made with the same key, why can't
> you divide one ciphertext in half and apply the same
> analysis?

What analysis do you have in mind that would be applicable to both
situations?

One-time pads are indeed unbreakable, and provably so.  The only
conditions are that the key be kept secret, that it be at least as long
as the plaintext, that it only be used once, and that it be totally
random.



------------------------------

From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Re: Crypto security of pseudo-random sequences
Date: Tue, 06 Mar 2001 10:17:43 +0100



Simon Johnson wrote:
> 
[snip]
> > (3) Using groups of n bits (e.g. n=24) to index the binary
> >     digits of Pi.
> 
> No, Pi is a well known determistic sequence and this would simply act as a
> monoalphabetic substitution. The attack against the good prng would still
> work with only minor change.

It is not a monoalphabetic substitution but the inverse
of a homophonic substitution, i.e. n bits to 1 bit. In
general, analysis of a PRNG depends on having groups of 
bits (each group being part of a single output) that stem
from consecutive outputs of the PRNG, as far as I am aware. 
Here, the chance of getting from the one bit obtained from 
Pi correctly to any bits of the PRNG that was used to index 
it very rapidly decreases with n. So I don't yet see a 
promising practical way of prediction with n sufficiently 
large.

M. K. Shen

------------------------------

From: "nospam"@"nonsuch.org" ("Bryan Olson")
Subject: Re: Super strong crypto
Date: Tue, 06 Mar 2001 09:32:37 GMT

Douglas A. Gwyn wrote:
>Bryan Olson wrote:
>> ...  One result I stated, and can show, is that the key
>> changes do not extend the amount of plaintext we can
>> send with information theoretic security.
>
>Sure, if you're using an unrealistic theory in which there is no
>cost of computation.

Do you forget who chose to base this on information theory?

Wagner:
| | Also, what is the relevance of unicity distance?
Gwyn:
| This thread was apparently about provably strong encryption,
| which forces an information-theoretic approach.

I suggested information theory was _not_ the approach you 
were taking, but you disagreed:

Olson:
: : You [do]
: : not have information theoretic security, and don't seem to
: : be taking that approach, or even seeking to demonstrate
: : security.

: I've been proposing a *line of thought* via straw-man
: designs in several phases, that is consistent with such
: an approach.

>I've been ignoring those responses since
>I'm not interested in impracticalities, just security in real
>systems.  If you can show that the sucessive phases of my straw-
>man design fail to address the real-world threats that I claimed
>for them, that would be useful.

And I'm not interested in yet another scheme conjectured to 
be computationally secure and neither proven nor disproven. 
I got interested because you said this was about provable 
security, and you suggested information theory in 
particular.  Here's the result we can prove: the schemes in 
your line of thought are _not_ information theoretically 
secure.  I cannot tell for sure what you meant or in what 
you are interested, but in response to what you wrote, that 
result is the answer.

You also mentioned you had another criterion for provable 
security.  If you would precisely state it, then maybe we 
could tell if it's useful in demonstrating security.  



--Bryan


------------------------------

From: "Jakob Jonsson" <[EMAIL PROTECTED]>
Subject: Re: How good is the KeeLoq algorithm?
Date: Tue, 6 Mar 2001 10:49:06 +0100

"r.e.s." <[EMAIL PROTECTED]> wrote in message
news:98233i$mnm$[EMAIL PROTECTED]...
>
> "Paul Crowley" wrote ...
> | "Simon Johnson" writes:
> | > RC4 is not an official standard as far as I am aware.
> |
> | There's an RFC that describes it, under the name "ARCFOUR".
>
> Where can that be found?
> (Web searches came up empty.)

Search for

ARCFOUR Thayer Kaukonen

at Google or Altavista and you may be lucky to find any of the expired
drafts (draft-kaukonen-cipher-arcfour-XX.txt). Yet, "ARCFOUR Algorithm" was
never published as an RFC (if you don't believe me, check for yourself at
ftp://ftp.isi.edu/in-notes/rfc-index.txt or
http://www.faqs.org/rfcs/index.html).

Jakob




------------------------------

From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: On encryption through bit permutations
Date: Tue, 06 Mar 2001 10:49:18 +0100


Permutations (transpositions) are nowadays commonly performed 
with the aid of PRNGs on units of 8-bit bytes or 4-bit hex 
digits for reasons of processing efficiency. A more thorough,
though more costly, diffusion can, however, evidently be 
obtained through permutations at the bit level. An encryption 
scheme that is based on bit permutations has recently been 
designed by Terry Ritter, where the stream of plaintext bits 
is first examined to generate (through appropriately 
introducing additional bits) blocks such that in each of them 
the total number of 0-bits is equal to that of 1-bits. The 
bits in each such blocks are then subject to a pseudo-random 
permutation. 

This idea of bit balancing of plaintext, while favourable in 
respect of security, has however the disadvantage of leading 
to a ciphertext that is longer and of a (variable) length 
dependent on the bit distribution of the plaintext, besides 
being somewhat complicated in implementation due to the
bit balancing operations. This would, in particular, render 
working with additional encryption operations that need a 
constant block size difficult. 

The following variation, which is also based on bit 
permutations and bit-balancing, doesn't lead to a longer 
ciphertext, though involves the trade-off of requiring two 
bit permutations instead of one, i.e. more computing work.

Suppose we process blocks of n bits (n assumed to be even).
For each plaintext block P to be encrypted, first use the
PRNG to generate a bit-balanced pseudo-random block B. 
Then we perform a pseudo-random permutation on P and a 
pseudo-random permuation on B and then xor the two to result 
in the ciphertext block C.

As pointed out by Terry Ritter in his proposal, each of the 
above two pseudo-random permutations may be done twice in 
order to more effectively prevent any predictability of the 
output of the PRNGs used from being exploited by the 
opponent. We mention that, due to the fact that the values 
output from the PRNG are only indirectly 'present' in the 
result of a permutation, it is hard for the opponent to 
start from the result of the permutations to reach useful 
informations about the outputs of the PRNG for prediction 
purposes. Since B is balanced, the arguments advanced by
Terry Ritter on bit balancing in his proposal concerning
the security apply also to the present scheme. Note also 
that for permuting P and B and for doing the double 
permutations separate (independent) PRNGs may be employed.

M. K. Shen
==========================
http://home.t-online.de/home/mok-kong.shen

------------------------------

From: Malte Borcherding <[EMAIL PROTECTED]>
Crossposted-To: alt.computer.security,comp.security
Subject: Re: What is SRT ?
Date: Tue, 06 Mar 2001 10:53:09 +0100

Marc wrote:
> I'm researching a E-commerce package which says it uses SRT to secure 
> the web browser connection to the server.
> 
> I have found that SRT appears to be a Java implementation of SSL, 
> to enable 128bit encryption outside of US. Also optimised to 
> E Banking.
>
> What I'm trying to find out is who did it, and has it been reviewed 
> by the wider internet community. Other attempts to "optimise" SSL 
> have resulted in it's being broken.
> 
> Anyone know about this product!

SRT is an implementation by Brokat Technologies (dated back from 1996)
that was essentially SSL plus an additional connection id in the
transmitted messages. The connection id is used to identify messages
related to a particular connection, thus making the communication
independent of any underlying transport protocol mechanism (such as TCP
sockets). Also, SRT suppots only a subset of the full SSL functionality
(no client authentication, no compression, but only strong cipher
suites). Otherwise, ot is identical to SSL. The implementation is still
used in many Java-based banking applications, although it is no longer
offered in current Brokat products. 

You can contact me directly if you need any further information.

Malte

-- 
===============================================================
Malte Borcherding              Technical Research Manager
Brokat Technologies            WWW:   http://www.brokat.com
Germany                        email: [EMAIL PROTECTED]

------------------------------

From: Malte Borcherding <[EMAIL PROTECTED]>
Crossposted-To: alt.computer.security,comp.security
Subject: Re: What is SRT ?
Date: Tue, 06 Mar 2001 10:53:34 +0100

Marc wrote:
> I'm researching a E-commerce package which says it uses SRT to secure 
> the web browser connection to the server.
> 
> I have found that SRT appears to be a Java implementation of SSL, 
> to enable 128bit encryption outside of US. Also optimised to 
> E Banking.
>
> What I'm trying to find out is who did it, and has it been reviewed 
> by the wider internet community. Other attempts to "optimise" SSL 
> have resulted in it's being broken.
> 
> Anyone know about this product!

SRT is an implementation by Brokat Technologies (dated back from 1996)
that was essentially SSL plus an additional connection id in the
transmitted messages. The connection id is used to identify messages
related to a particular connection, thus making the communication
independent of any underlying transport protocol mechanism (such as TCP
sockets). Also, SRT suppots only a subset of the full SSL functionality
(no client authentication, no compression, but only strong cipher
suites). Otherwise, ot is identical to SSL. The implementation is still
used in many Java-based banking applications, although it is no longer
offered in current Brokat products. 

You can contact me directly if you need any further information.

Malte

-- 
===============================================================
Malte Borcherding              Technical Research Manager
Brokat Technologies            WWW:   http://www.brokat.com
Germany                        email: [EMAIL PROTECTED]

------------------------------

From: [EMAIL PROTECTED] (Joe H. Acker)
Crossposted-To: sci.crypt.random-numbers,de.sci.informatik.misc,sci.math
Subject: Re: Monty Hall problem (was Re: philosophical question?)
Date: Tue, 6 Mar 2001 11:01:06 +0100

Mxsmanic <[EMAIL PROTECTED]> wrote:

> "Joe H. Acker" <[EMAIL PROTECTED]> wrote in message
> news:[EMAIL PROTECTED]...
> 
> > Interestingly, this can be tested empirically. All
> > you need is a good TRNG based on radioactive-decay
> > and a function that takes input from the TRNG to
> > produce an unbiased random number in an integer range.
> 
> I've done it, with a standard PRNG.  The empirical results still say
> that you should switch doors; you double your chances of winning that
> way.
> 
> > If I'm wrong, the first iterated run should create
> > a 33% and the second run a 66% winning rate.
> 
> In my tests, it did.
> 
> > Any volunters? (I don't have a TRNG...)
> 
> It doesn't have to be a TRNG; a PRNG will do.

My tests are contradicting to your test. They give a 50:50 result.

Actually, I did not expect anyone to take this seriously, but as you
must have implemented the algorithm in a wrong way, here is an
inefficient implementation of Monty's algorithm in a dialect similar to
VisualBasic, whereas Random(i) returns a PRNG random number between 0
and i (inclusive):

Function MontyHall(iterations as Integer, alwaysSwitching as Boolean) As
Integer
   Dim doors(2) as Integer
   Dim choice, monty_choice, car_door,i, j, counter as Integer
   
   CONST goat = 0
   CONST car = 1
   
   for j = 1 to iterations
      // assign car randomly to one of the doors
      car_door = Random(2)
      doors(car_door) = car
      
      // contestand picks out a door
      choice = Random(2)
      
      // Monty's algorithm
      if doors(choice) = car then
         // contestant has picked out the car door
         // Monty picks out any of the two remaining doors
         // deterministically, but could also be randomly chosen
         monty_choice = choice + 1
         if monty_choice > 2 then
            monty_choice = 0
         end if
      else
         // contestant has chosen a goat door
         // Monty determines the remaining door that is not the car door
         // the loop is indeed a stupid way to do this...
         for i = 0 to 2
            if i<>choice and i<>car_door then
               monty_choice = i
               exit // only one door can be the correct one, exit loop
            end if
         next
      end if
      
      // evaluate the result
      if alwaysSwitching then
         for i = 0 to 2
            if i<>choice and i<>monty_choice then
               choice = i
               exit
            end if
         next
      end if
      if doors(choice)=car then
         counter = counter + 1
      end if
      
      // reset
      doors(car_door) = 0
   next
   return counter
End Function

------------------------------


** FOR YOUR REFERENCE **

The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:

    Internet: [EMAIL PROTECTED]

You can send mail to the entire list by posting to sci.crypt.

End of Cryptography-Digest Digest
******************************

Reply via email to