>- -----Original Message-----
>X-Loop: openpgp.net
>From: Jack Oswald [mailto:[EMAIL PROTECTED]]
>Sent: Tuesday, June 06, 2000 5:05 PM
>To: [EMAIL PROTECTED]
>Subject: RE: random seed generation without user interaction?
>
>Jeff - in your posting, you mentioned mouse pointer waving. You should be
>aware that that method of gathering entropy has been patented and should not
>be used without a license.
>
>Jack
2 questions:
1. Who patented this?
2. What in the world are you peddling?
<http://www.rpkusa.com/tech.html>
Just to quote a few things from your website-
"Secure encryption implementations in use today can generally be
categorized as hybrid systems that combine a symmetric algorithm
(e.g. DES or RC4) with an asymmetric algorithm (e.g. RSA,
Diffie-Hellman key exchange). The RPK Encryptonite� Engine leverages
a core Mixture Generator� to perform both an
initialization/synchronization phase followed by a combining data
encryption phase. Therefore, RPK Encryptonite� accomplishes in one
algorithm what others only accomplish in two algorithms. The result
is substantially smaller code size, a less complex overall system,
more secure key management and dramatically smaller chip
implementations."
and a paragraph later
"Based on the same mathematics as Diffie-Hellman Key Exchange, the
security of RPK Encryptonite� is directly related to the difficulty
of solving the discrete log problem over large finite fields. Due to
the nature of the mathematics involved, the RPK Encryptonite� Engine
cannot effectively be cracked using distributed processing, as with
recently broken encryption systems. The security level of the RPK
Encryptonite� Engine is determined by key size, with typical secure
keys in the 600 bit range and above. RPK Encryptonite� has been
analyzed by world class cryptographers who have issued reports on the
security and integrity of the technology."
Not to accuse you of peddling snake oil but I'd be curious to see the
reports of your world class cryptographers as well as the math you
base your claims on. It seems to me (though I'd welcome a better
explanation) that ANY encryption algorithm (excluding our dear friend
the one-time pad) must have a finite set of keys. It must then be
possible to test those keys using one computer and by extensions
check more keys by throwing more computers at the problem. As
another minor note, there is no reason one cannot use an asymmetric
system on it's own. The reason hybrid systems are used is because of
the superior speed of symmetric algorithms and the better security
offered by generating session keys for each message (and thus
providing your attacker with fewer bytes of cyphertext encrypted with
a useful key (cracking the symmetric system reveals one message,
cracking the asymmetric breaks the entire system).
Thus it seems to me for your system to live up to the claims of the
second paragraph it must meet 2 requirements
1. It must be secure. It's also worth noting that as an asymmetric
algorithm it must be subject to much more rigorous proof of it's
security- asymmetric algorithms by there mathematical background
often fall pray to seemingly minor mathematical holes that break the
entire algorithm. Even the much revered RSA is subject to
devastating weakness when the system is manipulated.
2. It must be substanstially faster than a typical hybrid system (ie.
RSA and DES, or Diffie Helman and IDEA) when encrypting normal sized
messages.
I look forward to your reply.
--
Kevin "The Cubbie" Elliott
<mailto:[EMAIL PROTECTED]> ICQ#23758827
_______________________________________________________________________________
"As nightfall does not come at once, neither does oppression. In both
instances, there is a twilight when everything remains seemingly
unchanged. And it is in such twilight that we all must be most aware
of change in the air--however slight--lest we become unwitting
victims of the darkness."
-- Justice William O. Douglas