Cryptography-Digest Digest #44, Volume #14 Fri, 30 Mar 01 12:13:01 EST
Contents:
Re: diffie hellman ("Tom St Denis")
Re: Support for 1536 bit RSA keys? ("Tom St Denis")
Re: diffie hellman ("Henrick Hellstr�m")
Re: Support for 1536 bit RSA keys? ("Tom St Denis")
Re: diffie hellman ("Tom St Denis")
Re: Malicious Javascript in Brent Kohler post (was: Re: Who is Brent K (Mok-Kong
Shen)
Re: Malicious Javascript in Brent Kohler post (was: Re: Who is Brent K Kohler?)
("-[tCs]-")
Re: diffie hellman ("Henrick Hellstr�m")
Re: Pseudo-random permutation generators (Mok-Kong Shen)
Re: AES - test vectors? (Simon Josefsson)
Re: Idea - (LONG) ("John A. Malley")
Re: Pseudo-random permutation generators ("Toby Sharp")
Re: diffie hellman ("Tom St Denis")
Re: Support for 1536 bit RSA keys? ("Sam Simpson")
Re: Support for 1536 bit RSA keys? ("Sam Simpson")
Re: diffie hellman ("Henrick Hellstr�m")
Re: Support for 1536 bit RSA keys? ("Simon Hunt")
Re: Support for 1536 bit RSA keys? ("Sam Simpson")
----------------------------------------------------------------------------
From: "Tom St Denis" <[EMAIL PROTECTED]>
Subject: Re: diffie hellman
Date: Fri, 30 Mar 2001 15:51:29 GMT
"Henrick Hellstr�m" <[EMAIL PROTECTED]> wrote in message
news:9a27e7$60e$[EMAIL PROTECTED]...
> Use the formula a = 2**x mod p. x is the ephemeral private key. a is the
> ephemeral public key. You should use a secure (P)RNG to generate x.
>
> The other party generates y, calculates b = 2**y mod p and transmits b to
> you. You calculate K = b**x mod p. The other party calculates K = a**x mod
> p. K (or the hash value of K) is the shared session key.
>
> By using 2, you may substitute all multi precision multiplications for
shift
> left operations. There is little to gain by using 3 as the generator.
You can only use 2 if the subgroup generated is large enough. It may be
insecure.
> No, you don't really reduce security by using 2 as the generator. Suppose
> you use some other generator g instead. Then there is a number c such that
g
> = 2**c mod p. Let c' be the number such that c'c = 1 (mod (p-1)). That
would
> give you a = g**(c'x) mod p, b = g**(c'y) mod p, K = g**(c'xy) mod p, and
> your ephemeral private keys would in this case be x' = c'x mod (p-1), y' =
> c'y mod (p-1). If the attacker would be able to calculate x and y if 2 was
> used, then the attacker would most certainly be equally able to calculate
c
> and hence x' and y' if g was used.
This a) doesn't make sense and b) is wholly incorrect. If you have a 1024
bit p and the sub-group generated by 2 is only 64-bits wide then I could
find your private exponent (or a multiple thereof) easily.
Tom
------------------------------
From: "Tom St Denis" <[EMAIL PROTECTED]>
Subject: Re: Support for 1536 bit RSA keys?
Date: Fri, 30 Mar 2001 15:52:44 GMT
"Simon Hunt" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
> Sorry Tom, I agree with Sam - if you look at NT/2000 there is a task
"System
> Idle Process" - it's called that because when a PC is not doing anything
> productive, the internationally recognised term is it's "Idling" - hence
> Idle Time. You don't stop the clock cycles on a PC when it's not being
used,
> it still runs at the same rate internally so there has to be something to
> chew up all those extra cycles - the Idle task.
>
> I think the original quote was completely technically correct- you don't
> know what the average utilization of all the distributed computers was -
it
> could have been a load of corporate mainframes with only 0.001 idle
process
> time - you are making an opinion based on your (under utilized) pc. Mine
for
> instance runs at 99% all the time due to the processes I run....
>
> give in on this one - the world is not with you :-)
Nope. I won't.
Given the 1000's of computers in distributed.net do you honestly believe
they are all SGI's making the next Pixar film?
Tom
------------------------------
From: "Henrick Hellstr�m" <[EMAIL PROTECTED]>
Subject: Re: diffie hellman
Date: Fri, 30 Mar 2001 17:55:06 +0200
"Tom St Denis" <[EMAIL PROTECTED]> skrev i meddelandet
news:5Y1x6.164265$[EMAIL PROTECTED]...
>
> "Henrick Hellstr�m" <[EMAIL PROTECTED]> wrote in message
> news:9a27e7$60e$[EMAIL PROTECTED]...
> > Use the formula a = 2**x mod p. x is the ephemeral private key. a is the
> > ephemeral public key. You should use a secure (P)RNG to generate x.
> >
> > The other party generates y, calculates b = 2**y mod p and transmits b
to
> > you. You calculate K = b**x mod p. The other party calculates K = a**x
mod
> > p. K (or the hash value of K) is the shared session key.
> >
> > By using 2, you may substitute all multi precision multiplications for
> shift
> > left operations. There is little to gain by using 3 as the generator.
>
> You can only use 2 if the subgroup generated is large enough. It may be
> insecure.
>
> > No, you don't really reduce security by using 2 as the generator.
Suppose
> > you use some other generator g instead. Then there is a number c such
that
> g
> > = 2**c mod p. Let c' be the number such that c'c = 1 (mod (p-1)). That
> would
> > give you a = g**(c'x) mod p, b = g**(c'y) mod p, K = g**(c'xy) mod p,
and
> > your ephemeral private keys would in this case be x' = c'x mod (p-1), y'
=
> > c'y mod (p-1). If the attacker would be able to calculate x and y if 2
was
> > used, then the attacker would most certainly be equally able to
calculate
> c
> > and hence x' and y' if g was used.
>
> This a) doesn't make sense and b) is wholly incorrect. If you have a 1024
> bit p and the sub-group generated by 2 is only 64-bits wide then I could
> find your private exponent (or a multiple thereof) easily.
But the subgroup is 1023 bits wide. The OP mentioned that a Germaine prime
was to be used.
--
Henrick Hellstr�m [EMAIL PROTECTED]
StreamSec HB http://www.streamsec.com
------------------------------
From: "Tom St Denis" <[EMAIL PROTECTED]>
Subject: Re: Support for 1536 bit RSA keys?
Date: Fri, 30 Mar 2001 15:59:22 GMT
"SCOTT19U.ZIP_GUY" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
> [EMAIL PROTECTED] (Tom St Denis) wrote in
> <hb1x6.164137$[EMAIL PROTECTED]>:
>
>
> >
> >Ok smart arse try to factor this
> >
> >N =
> >8839143726083845882125258976826768843086739488346772188855474234625194373
> >213
> >0105906947037364319682243662953343134511945326982617559556366461785240346
> >27609
> >
> >If you can factor this 512-bit number within 5 years I will give you
> >100$. If you cannot I will assume you don't know what you are talking
> >about.
> >
>
> I have been confronted by assholes at work that made fast and loose
> statements about paying 100 bucks. Twice I did what they said. they
> didn't pay up. If some one comes up with a slick way of factoring
> and I use it you would say unfair. In short I know your offer is a lie.
I make alot more then 100$ a month... I could afford to pay up
>
>
> David A. Scott
> --
> SCOTT19U.ZIP NOW AVAILABLE WORLD WIDE "OLD VERSIOM"
> http://www.jim.com/jamesd/Kong/scott19u.zip
> Scott famous encryption website **now all allowed**
> http://members.nbci.com/ecil/index.htm
> Scott LATEST UPDATED sources for scott*u.zip
> http://radiusnet.net/crypto/archive/scott/
> Scott famous Compression Page
> http://members.nbci.com/ecil/compress.htm
> **NOTE FOR EMAIL drop the roman "five" ***
> A final thought from President Bill: "The road to tyranny,
> we must never forget, begins with the destruction of the truth."
------------------------------
From: "Tom St Denis" <[EMAIL PROTECTED]>
Subject: Re: diffie hellman
Date: Fri, 30 Mar 2001 16:00:00 GMT
"Henrick Hellstr�m" <[EMAIL PROTECTED]> wrote in message
news:9a2a5j$8n3$[EMAIL PROTECTED]...
> "Tom St Denis" <[EMAIL PROTECTED]> skrev i meddelandet
> news:5Y1x6.164265$[EMAIL PROTECTED]...
> >
> > "Henrick Hellstr�m" <[EMAIL PROTECTED]> wrote in message
> > news:9a27e7$60e$[EMAIL PROTECTED]...
> > > Use the formula a = 2**x mod p. x is the ephemeral private key. a is
the
> > > ephemeral public key. You should use a secure (P)RNG to generate x.
> > >
> > > The other party generates y, calculates b = 2**y mod p and transmits b
> to
> > > you. You calculate K = b**x mod p. The other party calculates K = a**x
> mod
> > > p. K (or the hash value of K) is the shared session key.
> > >
> > > By using 2, you may substitute all multi precision multiplications for
> > shift
> > > left operations. There is little to gain by using 3 as the generator.
> >
> > You can only use 2 if the subgroup generated is large enough. It may be
> > insecure.
> >
> > > No, you don't really reduce security by using 2 as the generator.
> Suppose
> > > you use some other generator g instead. Then there is a number c such
> that
> > g
> > > = 2**c mod p. Let c' be the number such that c'c = 1 (mod (p-1)). That
> > would
> > > give you a = g**(c'x) mod p, b = g**(c'y) mod p, K = g**(c'xy) mod p,
> and
> > > your ephemeral private keys would in this case be x' = c'x mod (p-1),
y'
> =
> > > c'y mod (p-1). If the attacker would be able to calculate x and y if 2
> was
> > > used, then the attacker would most certainly be equally able to
> calculate
> > c
> > > and hence x' and y' if g was used.
> >
> > This a) doesn't make sense and b) is wholly incorrect. If you have a
1024
> > bit p and the sub-group generated by 2 is only 64-bits wide then I could
> > find your private exponent (or a multiple thereof) easily.
>
>
> But the subgroup is 1023 bits wide. The OP mentioned that a Germaine prime
> was to be used.
Why not just use a group as large as possible?
Tom
------------------------------
From: Mok-Kong Shen <[EMAIL PROTECTED]>
Crossposted-To: alt.drugs.pot,rec.radio.swap,rec.running,rec.sport.skating.ice.figure
Subject: Re: Malicious Javascript in Brent Kohler post (was: Re: Who is Brent K
Date: Fri, 30 Mar 2001 18:09:08 +0200
I Can Help wrote:
>
[snip]
> Agreed - I have really never been able to find any USEFUL need for
> HTML (much less JavaScript) in a newsreader. They should all just block
> the code.
I am not quite sure of that. If you have complicated
mathematical formulae, you could use HTML to advantage.
I haven't acquainted myself with that, it is anyway a
feature contained in the newer XML specifications, I
believe.
M. K. Shen
------------------------------
From: "-[tCs]-"
Crossposted-To: alt.drugs.pot,rec.radio.swap,rec.running,rec.sport.skating.ice.figure
Subject: Re: Malicious Javascript in Brent Kohler post (was: Re: Who is Brent K
Kohler?)
Date: Fri, 30 Mar 2001 17:15:41 +0100
On Fri, 30 Mar 2001 18:09:08 +0200, Mok-Kong Shen
<[EMAIL PROTECTED]> shed a beam of light on us:
>
>
>I Can Help wrote:
>>
>[snip]
>> Agreed - I have really never been able to find any USEFUL need for
>> HTML (much less JavaScript) in a newsreader. They should all just block
>> the code.
>
>I am not quite sure of that. If you have complicated
>mathematical formulae, you could use HTML to advantage.
>I haven't acquainted myself with that, it is anyway a
>feature contained in the newer XML specifications, I
>believe.
>
>M. K. Shen
How often would you use scripted mathematical formulae in news group
postings? Creating a web page and linking to it would probably be a
more useful solution.
-=Cornelis
--
____ __ ___
___(_ _) _) __) ___
(___) )(( (_\__ \(___)
(__)\__|___/
= = =
Narc Narc (��)�
"Better bongs than bombs"
= = =
"On Usenet nobody can hear you scream..." - Satan
============================================
This message is made out of 100% recycled and happy electrons
------------------------------
From: "Henrick Hellstr�m" <[EMAIL PROTECTED]>
Subject: Re: diffie hellman
Date: Fri, 30 Mar 2001 18:17:27 +0200
"Tom St Denis" <[EMAIL PROTECTED]> skrev i meddelandet
news:442x6.164285$[EMAIL PROTECTED]...
>
> "Henrick Hellstr�m" <[EMAIL PROTECTED]> wrote in message
> > But the subgroup is 1023 bits wide. The OP mentioned that a Germaine
prime
> > was to be used.
>
> Why not just use a group as large as possible?
The premise stated in the OP was that p is a 1024 bit Germaine prime. Hence
the largest subgroup is 1023 bits wide, since its order is (p-1)/2. The
group Z*(p) itself is 1024 bits wide. I am not sure I understand what you
are suggesting.
--
Henrick Hellstr�m [EMAIL PROTECTED]
StreamSec HB http://www.streamsec.com
------------------------------
From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Re: Pseudo-random permutation generators
Date: Fri, 30 Mar 2001 18:14:38 +0200
Toby Sharp wrote:
>
> Can anyone explain how to construct a pseudo-random permutation generator,
> perhaps from a pseudo-random sequence generator? Speed is the foremost
> issue; the output will not be available to an attacker, so does not need to
> be cryptographically secure in the sense of cracking it from fragmented
> output.
In the 'general' case, there appears to be nothing
better than the algorithm of Durstenfeld (see Knuth vol. 2)
in practice.
M. K. Shen
------------------------------
From: Simon Josefsson <[EMAIL PROTECTED]>
Subject: Re: AES - test vectors?
Date: 30 Mar 2001 18:21:50 +0200
[EMAIL PROTECTED] (Marc) writes:
> Hi. I'm trying to get an AES implementation to work. However, I don't
> understand the test vector format from the AES web page. The file
> "ecb_e_m.txt" begins like this this:
>
> I=0
> KEY=00000000000000000000000000000000
> PT=00000000000000000000000000000000
> CT=C34C052CC0DA8D73451AFE5F03BE297F
This is calculated by feeding the cryptotext back into the ECB
encryption as plaintext 10,000 times, starting with the given PT and
always using the same KEY.
> I=1
> KEY=C34C052CC0DA8D73451AFE5F03BE297F
> PT=C34C052CC0DA8D73451AFE5F03BE297F
> CT=0AC15A9AFBB24D54AD99E987208272E2
This is the next round, and it simply uses the last cryptotext from
the previous 10,000 rounds as key during all iterations and the last
cryptotext as the initial plaintext.
> When I encrypt PT=00000000000000000000000000000000 with
> KEY=00000000000000000000000000000000 in 128/128 mode I get something
> different than CT=C34C052CC0DA8D73451AFE5F03BE297F. Am I reading the
> file wrong or is my implementation wrong?
What do you get? If you get CT=66E94BD4EF8A2C3B884CFA59CA342B2E I
think you only did 1 round instead of 10,000.
> Can anyone send me a binary snapshot of the BYTESUB 256byte lookup table?
> I don't know if my implementation calculates it correctly or not.
Here's what I use:
(defconst rijndael-S
[ 99 124 119 123 242 107 111 197 48 1 103 43 254 215 171 118
202 130 201 125 250 89 71 240 173 212 162 175 156 164 114 192
183 253 147 38 54 63 247 204 52 165 229 241 113 216 49 21
4 199 35 195 24 150 5 154 7 18 128 226 235 39 178 117
9 131 44 26 27 110 90 160 82 59 214 179 41 227 47 132
83 209 0 237 32 252 177 91 106 203 190 57 74 76 88 207
208 239 170 251 67 77 51 133 69 249 2 127 80 60 159 168
81 163 64 143 146 157 56 245 188 182 218 33 16 255 243 210
205 12 19 236 95 151 68 23 196 167 126 61 100 93 25 115
96 129 79 220 34 42 144 136 70 238 184 20 222 94 11 219
224 50 58 10 73 6 36 92 194 211 172 98 145 149 228 121
231 200 55 109 141 213 78 169 108 86 244 234 101 122 174 8
186 120 37 46 28 166 180 198 232 221 116 31 75 189 139 138
112 62 181 102 72 3 246 14 97 53 87 185 134 193 29 158
225 248 152 17 105 217 142 148 155 30 135 233 206 85 40 223
140 161 137 13 191 230 66 104 65 153 45 15 176 84 187 22]
"Rijndael S-box.")
------------------------------
From: "John A. Malley" <[EMAIL PROTECTED]>
Subject: Re: Idea - (LONG)
Date: Fri, 30 Mar 2001 08:18:21 -0800
Mok-Kong Shen wrote:
>
[snip]
> I don't yet understand. My point was that, if you change
> you four variable length messages to constant length ones,
> as I indicated in my follow-up, then the encryption
> becomes a normal block encryption (the characteristic
> of a block encryption is that it transforms a constant
> number of bits to the same number of bits, in the present
> case 2). So with that change you obtain a block cipher.
> All the computations about probabilities remains the same.
> In other words, your statements relating to Shannon
> and his perfect security in the case of your original
> example translates to the modified example unchanged.
Yes, that's true. XORing the random key with the plaintext string is an
algorithm to achieve this perfect secrecy, but that's not the algorithm
I wanted to address.
> Doesn't that achieves your goal of finding a block
> cipher under the said context of Shannon?
No, but I didn't make myself clear in my original post. I did with a
follow-up to my reply to Prof. Wagner.
Let me present it again, :-)
Can a product cipher (or specifically a Feistel cipher) block cipher
algorithm with perfect secrecy exist?
Elaborating -
Can we construct a block cipher with perfect secrecy by cascading
substitution and transposition "units" in some sequence? Or with a
Feistel cipher? Will the resulting algorithm yield that particular set
of permutation mappings such that each message is mapped to each
cryptogram in just one of the maps (and thus by just one of the possible
keys.)
If this cannot be done with a product cipher or Feistel cipher then we
(possibly) establish some fundamental limits on the achievable secrecy
of a block cipher algorithm.
John A. Malley
[EMAIL PROTECTED]
------------------------------
From: "Toby Sharp" <[EMAIL PROTECTED]>
Subject: Re: Pseudo-random permutation generators
Date: Fri, 30 Mar 2001 17:22:39 +0100
I don't have that reference. Can you summarize the algorithm?
TIA,
Toby.
Mok-Kong Shen <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
>
>
> Toby Sharp wrote:
> >
> > Can anyone explain how to construct a pseudo-random permutation
generator,
> > perhaps from a pseudo-random sequence generator? Speed is the foremost
> > issue; the output will not be available to an attacker, so does not need
to
> > be cryptographically secure in the sense of cracking it from fragmented
> > output.
>
> In the 'general' case, there appears to be nothing
> better than the algorithm of Durstenfeld (see Knuth vol. 2)
> in practice.
>
> M. K. Shen
------------------------------
From: "Tom St Denis" <[EMAIL PROTECTED]>
Subject: Re: diffie hellman
Date: Fri, 30 Mar 2001 16:25:55 GMT
"Henrick Hellstr�m" <[EMAIL PROTECTED]> wrote in message
news:9a2bfg$aeu$[EMAIL PROTECTED]...
> "Tom St Denis" <[EMAIL PROTECTED]> skrev i meddelandet
> news:442x6.164285$[EMAIL PROTECTED]...
> >
> > "Henrick Hellstr�m" <[EMAIL PROTECTED]> wrote in message
> > > But the subgroup is 1023 bits wide. The OP mentioned that a Germaine
> prime
> > > was to be used.
> >
> > Why not just use a group as large as possible?
>
>
> The premise stated in the OP was that p is a 1024 bit Germaine prime.
Hence
> the largest subgroup is 1023 bits wide, since its order is (p-1)/2. The
> group Z*(p) itself is 1024 bits wide. I am not sure I understand what you
> are suggesting.
The problem is if g is a generator modulo a s.g prime p, then g^(p-1/2) != 1
and g^(p-1)=1 and g^2 != 1 all is well meaning g is a generator.
The sub-groups of a s.g prime have orders, 0, 2, and (p-1)/2
Because I was an idiot I overlooked that all except 0 and 1/-1 belong to
(p-1)/2
Sorry.
Tom
------------------------------
From: "Sam Simpson" <[EMAIL PROTECTED]>
Subject: Re: Support for 1536 bit RSA keys?
Date: Fri, 30 Mar 2001 17:28:45 +0100
I think Tom alluded to the point, and my response was something like:
"Rivest predicted that a 129-bit factorization would take 40-quadrillion
years whereas in reality it took just 8 months using idle cycles on
computers around the globe. I'd say it pays to be cautious with keylengths."
Breaking RSA keys of a specific key size (e.g. 1024-bits, whatever) could be
the result of a combination of:
1) More powerful processors to break the keys (e.g. QC, DNA computing or
simply better processors due to natural improvement in engineering
techniques - whatever).
2) More processors (e.g. if every TV set includes the equiv of a 1Ghz
Athlon sometime (not totally theoretical - think MPG decoding or something)
then the number of available computing power increases)
3) Better algorithms.
The original RSA129 challenge was only broken because of a combination of
the above. Does that mean that 1024-bit keys can be broken?
No.
Cryptographers know all the above, that's why Lenstra, Odlyzko, Schneier etc
make statements to the effect of "use 2048-bit keys for long term security".
--
Regards,
Sam
http://www.scramdisk.clara.net/
Simon Hunt <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
> One point nobody has made is that if (somehow) a way of breaking a 1024
bit
> key is discovered, then because of the supposed mathematical impossibility
> of the task they will have probably discovered a way of breaking ANY RSA
> key, no matter it's size.
>
> as an example, a quantum computer takes the same amount of time (no time
at
> all!) to break a 64bit RSA key, as a 64 quadrillion bit RSA key...
>
> think about that!
>
> Simon.
>
> "Sam Simpson" <[EMAIL PROTECTED]> wrote in message
> news:ds%w6.2900$[EMAIL PROTECTED]...
> > Why not? If you can stomach the speed issues (e.g. key is a key signing
> CA
> > key used v. occasionally) and you can gather the entropy to produce such
a
> > large key...
> >
> > I'm sure people said the same kind of thing about 1500-bit keys when 512
> was
> > the de facto standard..........
> >
> > --
> > Regards,
> >
> > Sam
> > http://www.scramdisk.clara.net/
> >
> > Tom St Denis <[EMAIL PROTECTED]> wrote in message
> > news:Hl%w6.163951$[EMAIL PROTECTED]...
> > >
> > > "Sam Simpson" <[EMAIL PROTECTED]> wrote in message
> > > news:J0%w6.2868$[EMAIL PROTECTED]...
> > > > Tom St Denis <[EMAIL PROTECTED]> wrote in message
> > > > news:lA_w6.163933$[EMAIL PROTECTED]...
> > > > >
> > > > > <[EMAIL PROTECTED]> wrote in message
> > > > > news:Ne_w6.1530$[EMAIL PROTECTED]...
> > > > > > Thanks for reading this.
> > > > > >
> > > > > > I am trying to assess cryptographic toolkit, certificate
> generation
> > > > > software,
> > > > > > certificate validation software vendor support for 1536-bit RSA
> > keys.
> > > > > >
> > > > > > I expect good support for 1024-bit and 2048-bit keys as they are
> > > > > "standard" key
> > > > > > lengths. Should I expect such good support for 1536-bit keys?
> > > > >
> > > > > This is because you're a nutcase. Factoring is a hard job.
> "2048-bit
> > > > keys"
> > > > > are not standard ... they are for paranoids.
> > > >
> > > > "If 512-bit keys are insecure today, they were just as insecure last
> > > month.
> > > > Anyone implementing RSA should have moved to 1028-bit keys years
ago,
> > and
> > > > should be thinking about 2048-bit keys today. It's tiring when
people
> > > don't
> > > > listen to cryptographers when they say that something is insecure,
> > waiting
> > > > instead for someone to actually demonstrate the insecurity.".
> > >
> > > So let's use 10kbit rsa keys?
> > >
> > > Tom
> > >
> > >
> >
> >
>
>
------------------------------
From: "Sam Simpson" <[EMAIL PROTECTED]>
Subject: Re: Support for 1536 bit RSA keys?
Date: Fri, 30 Mar 2001 17:32:43 +0100
Tom St Denis <[EMAIL PROTECTED]> wrote in message
news:j71x6.164128$[EMAIL PROTECTED]...
>
> "Sam Simpson" <[EMAIL PROTECTED]> wrote in message
> news:9D0x6.3011$[EMAIL PROTECTED]...
> > Tom St Denis <[EMAIL PROTECTED]> wrote in message
> > news:tu0x6.164064$[EMAIL PROTECTED]...
> >
> > <SNIP>
> >
> > > If we can't factor 768-bit keys are 2048-bit ones better?
> >
> > To quote Schneier again: "If 512-bit keys are insecure today, they were
> just
> > as insecure last month. Anyone implementing RSA should have moved to
> > 1028-bit keys years ago, and should be thinking about 2048-bit keys
today.
> > It's tiring when people don't listen to cryptographers when they say
that
> > something is insecure, waiting instead for someone to actually
demonstrate
> > the insecurity."
> >
> > Or, to paraphrase: Tom *listen* to cryptographers.
>
> This line of thinking is inherantly flawed. 1024 bit keys will be
insecure
> 10 years from now (just assume) so that means they are insecure now?
Hey, we are getting somewhere:
The original poster indicated the data needs to be secured for 20 years!
--
Regards,
Sam
http://www.scramdisk.clara.net/
------------------------------
From: "Henrick Hellstr�m" <[EMAIL PROTECTED]>
Subject: Re: diffie hellman
Date: Fri, 30 Mar 2001 18:41:45 +0200
"Tom St Denis" <[EMAIL PROTECTED]> skrev i meddelandet
news:ns2x6.164325$[EMAIL PROTECTED]...
> The sub-groups of a s.g prime have orders, 0, 2, and (p-1)/2
>
> Because I was an idiot I overlooked that all except 0 and 1/-1 belong to
> (p-1)/2
You were not such an idiot. 1,-1 are the members of the subgroup of order 2,
and that's the only other subgroup. But there are also approximately 2**1023
numbers not belonging to any subgroup, i.e. the discrete square roots of the
elements in the large subgroup. Hence, if 2 is a generator of Z*(P) and A =
2**X mod P, then by knowing A you will easily deduce the lsbit of X, but
that's about all. If this is a concern, then you might use 4 as generator
instead.
> Sorry.
By all means, but no need for that.
--
Henrick Hellstr�m [EMAIL PROTECTED]
StreamSec HB http://www.streamsec.com
------------------------------
From: "Simon Hunt" <[EMAIL PROTECTED]>
Subject: Re: Support for 1536 bit RSA keys?
Date: Fri, 30 Mar 2001 17:39:53 +0100
how do you determine that Ron's original quote..
It is of interest to note that Rivest predicted that
a
> 129-bit factorization would take 40-quadrillion years whereas in reality
it
> took just 8 months
> using idle cycles on computers around the globe
was refering to distributed.net? And again, you are arguing a technicality.
Distributed.net runs in idle time - the fact that you process more
information in idle time than non-idle time is irrelevant. It's
still ----idle time----
we are not talking about a car engine here!
Simon.
"Tom St Denis" <[EMAIL PROTECTED]> wrote in message
news:gZ1x6.164268$[EMAIL PROTECTED]...
>
> "Simon Hunt" <[EMAIL PROTECTED]> wrote in message
> news:[EMAIL PROTECTED]...
> > Sorry Tom, I agree with Sam - if you look at NT/2000 there is a task
> "System
> > Idle Process" - it's called that because when a PC is not doing anything
> > productive, the internationally recognised term is it's "Idling" - hence
> > Idle Time. You don't stop the clock cycles on a PC when it's not being
> used,
> > it still runs at the same rate internally so there has to be something
to
> > chew up all those extra cycles - the Idle task.
> >
> > I think the original quote was completely technically correct- you don't
> > know what the average utilization of all the distributed computers was -
> it
> > could have been a load of corporate mainframes with only 0.001 idle
> process
> > time - you are making an opinion based on your (under utilized) pc. Mine
> for
> > instance runs at 99% all the time due to the processes I run....
> >
> > give in on this one - the world is not with you :-)
>
> Nope. I won't.
>
> Given the 1000's of computers in distributed.net do you honestly believe
> they are all SGI's making the next Pixar film?
>
> Tom
>
>
------------------------------
From: "Sam Simpson" <[EMAIL PROTECTED]>
Subject: Re: Support for 1536 bit RSA keys?
Date: Fri, 30 Mar 2001 17:49:10 +0100
Tom St Denis <[EMAIL PROTECTED]> wrote in message
news:hb1x6.164137$[EMAIL PROTECTED]...
<SNIP>
> Ok smart arse try to factor this
>
> N =
>
8839143726083845882125258976826768843086739488346772188855474234625194373213
> 0105906947037364319682243662953343134511945326982617559556366461785240346
> 27609
>
> If you can factor this 512-bit number within 5 years I will give you 100$.
> If you cannot I will assume you don't know what you are talking about.
That's the kind of "school boy" intelligence that Mark Wooding, Greg Rose,
Paul Crowley etc have commented on before and you've responded: " Is this
group just wildly incompetent or am I just in every killfile for trying to
be intelligent?"
If this post is indicative of you "trying to be intelligent", then you are
thicker than you appear. Personally, I think you are pretty bright (in
respect of maths / crypto), but lack developed reasoning and social
interaction skills. Perhaps you'll gain them with age??
Anyway, back to the thread:
All I've been doing is trying to make you provide reason for the wild
statements you have made in this thread. Note that all the way through I've
been providing citations to quotes by respected cryptographers - I haven't
seen this from you?
Who cares if *I* can break a 512-bit key - this group {is | should} be about
whether *anyone* can break a 512-bit key, which is clearly the case.
Regards,
Sam
http://www.scramdisk.clara.net/
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list by posting to sci.crypt.
End of Cryptography-Digest Digest
******************************