Re: chip-level randomness?

2001-09-20 Thread David Wagner
Bill Frantz wrote: >At 2:17 PM -0700 9/19/01, Theodore Tso wrote: >>It turns out that with the Intel 810 RNG, it's even worse because >>there's no way to bypass the hardware "whitening" which the 810 chip >>uses. > >Does anyone know what algorithm the "whitening" uses? Just like von Neumann's un

Re: Best practices/HOWTO for key storage in small office/home office setting?

2001-10-01 Thread David Wagner
What are your security goals? Do you want to prevent key leakage, or merely detect if it happens? What is your threat model? Are you dealing with very sophisticated adversaries, or merely "the maid casually snoops through the wastebasket"? For many home offices, I would imagine that the main t

Re: Computer Security Division Activities

2001-10-13 Thread David Wagner
Mike Brodhead wrote: >Just about all of the private-sector conferences I have attended >require registration. I think this is a poor example. I expect you'd be welcome to use the name 'John Smith' and pay cash, if you like. I think the real point is this: We see, all too often, cases where it

Re: Scarfo "keylogger", PGP

2001-10-15 Thread David Wagner
It seems the FBI hopes the law will make a distinction between software that talks directly to the modem and software that doesn't. They note that PGP falls into the latter category, and thus -- they argue -- they should be permitted to snoop on PGP without needing a wiretap warrant. However, if

Re: password-cracking by journalists... (long, sorry)

2002-01-21 Thread David Wagner
Will Rodger wrote: >It included all sorts of people traipsing up to >Capitol Hill to make sure that ordinary research and system maintenance, >among other things, would not be prosecuted. I think our understanding of the DMCA has changed significantly since it was first introduced, and it's no

Re: Bernstein's NFS machine

2002-03-02 Thread David Wagner
Very interesting. Thanks for the analysis. Bernstein's analysis is based on space*time as your cost metric. What happens if we assume that space comes for free, and we use simply time as our cost metric? Do his techniques lead to an improvement in this case? It looks to me like there is no imp

Re: Shortcut digital signature verification failure

2002-06-22 Thread David Wagner
Bill Frantz wrote: >If there is a digital signature algorithm which has the property that most >invalid signatures can be detected with a small amount of processing, then >I can force the attacker to start expending his CPU to present signatures >which will cause my server to expend it's CPU. My

Re: Shortcut digital signature verification failure

2002-06-24 Thread David Wagner
Nomen Nescio wrote: >[asks good questions about my re-telling of Dan Bernstein's signature trick] Great questions! The explanation is that I botched the description of Bernstein's trick. Let me try again and see if I can get it right this time. A signature on message m is a tuple (h,s,k) such

Re: building a true RNG (was: Quantum Computing ...)

2002-07-24 Thread David Wagner
Eugen Leitl wrote: >Is there any point in compressing the video before running it through a >cryptohash? No. (assuming you're talking about lossless compression) In general, any invertible transformation neither adds or subtracts entropy, and hence is extremely unlikely to make any difference

Re: building a true RNG

2002-07-27 Thread David Wagner
Amir Herzberg wrote: >So I ask: is there a definition of this `no wasted entropy` property, which >hash functions can be assumed to have (and tested for), and which ensures >the desired extraction of randomness? None that I know of. I'm not aware of much work in the crypto literature on this top

Re: building a true RNG

2002-07-27 Thread David Wagner
John S. Denker wrote: >Amir Herzberg wrote: >> So I ask: is there a definition of this `no wasted entropy` property, which >> hash functions can be assumed to have (and tested for), and which ensures >> the desired extraction of randomness? > >That's the right question. > >The answer I give in the

Re: building a true RNG

2002-07-27 Thread David Wagner
John S. Denker wrote: >I'm talking about a !!hash!! function that doesn't waste entropy. Out of curiousity, what, precisely, does "doesn't waste entropy" mean? For instance, do you mean the following? Definition. Let f:X->Y be a function, and assume |X| > |Y|. When D is a distribution, we

Re: building a true RNG

2002-07-29 Thread David Wagner
> However, what we're working with in the case of a typical RNG isn't > functions between finite buffer-fulls of data, but functions between > infinite sets of entire bitstreams which need to be implemented within a > finite memory constraint. Whatever the algorithm, it can have state. That obvio

Re: building a true RNG

2002-07-29 Thread David Wagner
> An example: presume we take a simple first order statistical model. If our > input is an 8-bit sample value from a noise source, we will build a 256 > bin histogram. When we see an input value, we look its probability up in > the model, and discard every 1/(p(x)-1/256)'th sample with value x. Wh

Re: building a true RNG

2002-07-29 Thread David Wagner
Barney Wolff wrote: >This leads me to ask what may be a laughably naive question: >Do we even know that the popular hash functions can actually generate >all 2^N values of their outputs? It seems very unlikely that they can generate all 2^N outputs (under current knowledge). However, they satis

Re: building a true RNG

2002-07-29 Thread David Wagner
Oh dear. On re-reading your message I now suspect that what you asked is not what I originally thought you asked. I see two questions here: Q1: If we cycle through all N-bit messages, are all 2^N output values possible? Q2: If we cycle through all messages (possibly very long or

Re: building a true RNG

2002-07-29 Thread David Wagner
> 3) For a one-way hash function should not expect a _constructive_ > proof that it generates all possible codes; such a construction > would violate the one-way property. Nitpick: the last statement does not seem quite right to me. I'm thinking of the notion of a one-way permutation. For ins

Re: building a true RNG

2002-07-29 Thread David Wagner
Sandy Harris wrote: >I think the interesting question is whether, for M-bit hash inputs, >and an N-bit hash, with a lower bound Q on entropy per input batch, >so M > Q > N, we can show, as I think Denker is claiming to have done, >that the entropy of hash(M) must be > N - epsilon, for some epsilo

Re: building a true RNG

2002-07-29 Thread David Wagner
> DES, being extremely hardware friendly, can be (ab)used to > make a strong one-way hash. (E.g., raw input into both key and data maps > 56+64 -> uniformly distributed 64 bits.) However, when used in this way, DES is not an especially good hash function. For instance, it is easy to find collisi

Re: building a true RNG

2002-07-29 Thread David Wagner
> Somewhat related to that, are there any block cipher->hash function methods > that are actually secure? Every one I've ever read about seems to have been > broken. One standard method is to use Davies-Meyer mode with a block cipher that has a very strong key schedule and has a sufficiently larg

Re: building a true RNG

2002-07-29 Thread David Wagner
> To test a hash function h() whose range is S, > let F be the set of "balanced" functions from S -> {0, 1}. (Balanced > meaning that each f in F maps exactly half of S to 0 and half to 1.) > If you can contrive to choose many members of F at random, and compose > them with h for many arguments o

Re: building a true RNG

2002-07-29 Thread David Wagner
> The reason for batching entropy input is to prevent someone who has > broken your system once from discovering each small entropy input by > exhaustive search. (There was a nice paper pointing this out in. If > someone has the reference...) I believe you are referring to the state compromis

Re: building a true RNG

2002-07-29 Thread David Wagner
> I don't even think anyone has analyzed the entropy preservation of a > theoretically perfect "random oracle" Well, I know this particular point wasn't central to your email, but I'm not sure I agree with you on this small point. I believe it should be more or less straightforward to analyze th

Re: building a true RNG

2002-07-29 Thread David Wagner
> David Wagner wrote: > > Actually, there is not much hope for such a property. It is pretty easy > > to see that, if we make no assumptions on the entropy inputs other than > > they have sufficient entropy, then no single deterministic algorithm can > > ever be go

Re: building a true RNG

2002-07-29 Thread David Wagner
> > Nitpick: You can sample from such a set. You can generate m randomx > > values from this set with about 10m computations of SHA-1: simply pick > > a random x, check whether SHA-1(x) has its first ten zeros, and if not > > go back and pick another x until you find one that works. > > 1024m no

Re: building a true RNG

2002-07-30 Thread David Wagner
Amir Herzberg wrote: >But there's a big difference: the random oracle `assumption` is clearly not >valid for SHA-1 (or any other specific hash function). Well, the random oracle model has problems, but I think those problems are a bit more subtle than just an assumption that is true or false. >S

Re: building a true RNG

2002-08-01 Thread David Wagner
> David Wagner <[EMAIL PROTECTED]> writes: > > I don't know of any good cryptographic hash function that comes with > > a proof that all outputs are possible. However, it might not be too > > hard to come up with plausible examples. For example, if we apply t

Re: [SIMSOFT] Protecting Privacy with Translucent Databases

2002-08-03 Thread David Wagner
R. A. Hettinga wrote: >Protecting Privacy with Translucent Databases > >Last week, officials at Yale University complained to >the FBI that admissions officers from >Princeton University had broken into >a Yale Web site and downloaded adm

Re: Quantum computers inch closer?

2002-09-02 Thread David Wagner
David Honig wrote: >At 08:56 PM 8/30/02 -0700, AARG!Anonymous wrote: >>The problem is that you can't forcibly collapse the state vector into your >>wished-for eigenstate, the one where the plaintext recognizer returns a 1. >>Instead, it will collapse into a random state, associated with a random

Re: Quantum computers inch closer?

2002-09-02 Thread David Wagner
John S. Denker wrote: >3) A sufficiently well designed quantum computer can, >in principle, find some needles in some haystacks, >precisely because the structure of the machine, acting >according to the laws of quantum mechanics, does in fact >"collapse" the wave-function into a representation

Re: Quantum computers inch closer?

2002-09-02 Thread David Wagner
Ed Gerck wrote: >The original poster is correct, however, in that a metric function can >be defined >and used by a QC to calculate the distance between a random state and an >eigenstate with some desired properties, and thereby allow the QC to define >when that distance is zero -- which provides

Re: Cryptogram: Palladium Only for DRM

2002-09-17 Thread David Wagner
AARG!Anonymous wrote: >David Wagner writes: >> Standard process separation, sandboxes, jails, virtual machines, or other >> forms of restricted execution environments would suffice to solve this >> problem. > >Nothing done purely in software will be as effective as

Re: Cryptogram: Palladium Only for DRM

2002-09-19 Thread David Wagner
Peter N. Biddle wrote: >[...] You can still extract everything in Pd via a HW attack. [...] > >How is this BORE resistant? The Pd security model is BORE resistant for a >unique secret protected by a unique key on a given machine. Your hack on >your machine won't let you learn the secrets on my mac

Re: unforgeable optical tokens?

2002-09-20 Thread David Wagner
Perry E. Metzger wrote: >http://www.nature.com/nsu/020916/020916-15.html > >An idea from some folks at MIT apparently where a physical token >consisting of a bunch of spheres embedded in epoxy is used as an >access device by shining a laser through it. Yeah. I think it's neat! This is not a rep

Re: unforgeable optical tokens?

2002-09-20 Thread David Wagner
Perry E. Metzger wrote: >But if you can't simulate the system, that implies that the challenger >has to have stored the challenge-response pairs because he can't just >generate them, right? That means that only finitely many are likely to >be stored. Or was this thought of too? I believe the idea

Re: unforgeable optical tokens?

2002-09-20 Thread David Wagner
Barney Wolff wrote: >Actually, it can. The server can store challenge-responses in pairs, >then send N as the challenge and use the N+1 response (not returned) >as the key. But why bother? What does this add over just using crypto without their fancy physical token? The uncloneability of thei

Re: unforgeable optical tokens?

2002-09-24 Thread David Wagner
Bill Frantz wrote: >If the challenger selects several of his stored challenges, and asks the >token reader to return a secure hash of the answers (in order), no >information will be leaked about the response to any individual challenge. >This procedure will allow the challenger to perform a large

Re: Why is RMAC resistant to birthday attacks?

2002-10-23 Thread David Wagner
Ed Gerck wrote: >(A required property of MACs is providing a uniform distribution of values for a >change in any of the input bits, which makes the above sequence extremely >improbable) Not so. This is not a required property for a MAC. (Not all MACs must be PRFs.) -

Re: Why is RMAC resistant to birthday attacks?

2002-10-24 Thread David Wagner
Ed Gerck wrote: >Wei Dai wrote: >> No matter how good the MAC design is, it's internal collision probability >> is bounded by the inverse of the size of its internal state space. > >Actually, for any two (different) messages the internal collision probability >is bounded by the inverse of the SQUA

Re: collision resistance -- Re: Why is RMAC resistant to birthday attacks?

2002-10-24 Thread David Wagner
> There seems to be a question about whether: > > 1. the internal collision probability of a hash function is bounded by the > inverse of the size of its internal state space, or > > 2. the internal collision probability of a hash function is bounded by the > inverse of the square root of size o

Re: New Protection for 802.11

2002-11-06 Thread David Wagner
Perry E. Metzger wrote: >Does anyone know details of the new proposed protocols? WPA seems to be TKIP (a short-term improvement to WEP) + 802.1x (user authentication, typically hooked into RADIUS?). The background is that the IEEE 802.11i working group is developing two fixes to WEP: TKIP, the sh

Re: DOS attack on WPA 802.11?

2002-12-08 Thread David Wagner
Arnold G. Reinhold wrote: >If I am right and WPA needlessly >introduces a significant denial of service vulnerability, then it >should be fixed. If I am wrong, no change is needed of course. But TKIP (the part of WPA you're talking about) is only a temporary measure, and will soon be replaced by

Re: Micropayments, redux

2002-12-16 Thread David Wagner
Ed Gerck wrote: >1. If there is no limit, then the well-known doubling >strategy would allow the user to, eventually, make the >bank lose -- the user getting a net profit. I think you misunderstand the nature of the martingale strategy. It's not a good way to win in Las Vegas, and it's not a good

Re: Micropayments, redux

2002-12-16 Thread David Wagner
Ed Gerck wrote: >For example, in reply to my constraint #2, you say: > > "This is expected to be roughly counterbalanced by the > number of unlucky users who quite (sic) "while behind"." > >but these events occur under different models. If there >is no prepayment (which is my point #2) then many

Re: Micropayments, redux

2002-12-16 Thread David Wagner
Matt Crawford wrote: >> No, it doesn't. It doesn't take unlimited time for lottery-based >> payment schemes to average out; finite time suffices to get the >> schemes to average out to within any desired error ratio. > >Strictly speaking, the average will come within your error tolerance >of the

Re: What, me worry?

2003-01-16 Thread David Wagner
Jon Simon wrote: >I seriously doubt any new DRM system will be totally secure in hardware >or software at v5.0, let alone v1.0. So why worry? Because those attacks will be illegal. No, wait -- they already are illegal. This means that the good guys will be reluctant to break the DRM for legit

Re: Prime numbers guru 'factors' down success

2003-01-20 Thread David Wagner
Ben Laurie wrote: >William Knowles wrote: >> Prime numbers (such as 1, 5, 11, 37...) are divisible only by >> themselves or 1. While smaller prime numbers are easy to make out, for >> very large numbers, there never had been a formula for "primality >> testing" until August 2002. > >Doh! This i

Re: Key Pair Agreement?

2003-01-20 Thread David Wagner
Jeroen C. van Gelderen wrote: >Here is a scenario: Scott wants Alice to generate a key pair after >which he will receive Alice's public key. At the same time, Scott wants >to make sure that this key pair is newly generated (has not been used >before). You might be able to have Scott specify a 6

Re: Key Pair Agreement?

2003-01-21 Thread David Wagner
Jack Lloyd wrote: >However there is no way to be sure the RSA key is actually at all safe in >this case. For example, Alice could choose a 950 bit prime, and then >whenever she needed a new key, just choose a small (50 or 100 bit) prime as >the other factor. Hold on a minute. The problem was to

Re: [IP] Master Key Copying Revealed (Matt Blaze of ATT Labs)

2003-01-24 Thread David Wagner
Len Sassaman wrote: >This is a rather clever technique for discovering the second key of a >dual-keyed lock; however, it wasn't previously unknown. > >It was described to me in 1997, when I first started working with >locksmithing, [...] > >The fact that AT&T couldn't find much public mention of t

Re: Columbia crypto box

2003-02-10 Thread David Wagner
Trei, Peter wrote: >The weird thing about WEP was its choice of cipher. It used RC4, a >stream cipher, and re-keyed for every block. . RC4 is >not really intended for this application. Today we'd >have used a block cipher with varying IVs if neccessary > >I suspect that RC4 was chosen for other re

Re: AES-128 keys unique for fixed plaintext/ciphertext pair?

2003-02-18 Thread David Wagner
Matt Crawford wrote: >But here's the more interesting question. If S = Z/2^128 and F is the >set of all bijections S->S, what is the probability that a set G of >2^128 randomly chosen members of F contains no two functions f1, f2 >such that there exists x in S such that f1(x) = f2(x)? Vanishingly

Re: Proven Primes

2003-03-07 Thread David Wagner
Bill Frantz wrote: >I guess I'm dumb, but how to you verify a proof of Sophie Germain primeness >with less effort than to run the tests yourself? There are ways to prove that p is prime so that the receiver can verify the proof more easily than it would be to construct a proof. The verification

Re: Microsoft: Palladium will not limit what you can run

2003-03-14 Thread David Wagner
Hermes Remailer wrote: >Hopefully this will shed light on the frequent claims that Palladium will >limit what programs people can run, [...] That's a strawman argument. The problem is not that Palladium will *itself* directly limit what I can run; the problem is what Palladium enables. Why are

Re: Who's afraid of Mallory Wolf?

2003-03-24 Thread David Wagner
Ian Grigg wrote: >By common wisdom, SSL is designed to defeat >the so-called "Man in the Middle" attack, or >MITM for short. > >The question arises, why? One possible reason: Because DNS is insecure. If you can spoof DNS, you can mount a MITM attack. A second possible reason: It's hard to predic

Re: Brumley & Boneh timing attack on OpenSSL

2003-03-24 Thread David Wagner
Nomen Nescio wrote: >Regarding using blinding to defend against timing attacks, and supposing >that a crypto library is going to have support for blinding: > > - Should it do blinding for RSA signatures as well as RSA decryption? > - How about for DSS signatures? My guess is that it's not necessa

Re: Who's afraid of Mallory Wolf?

2003-03-25 Thread David Wagner
Ian Grigg writes: >> I don't think mere monetary costs are even germane to >> something like this. The costs, publicly and personally, >> are of a different kind than money expresses. > >I'm sorry to disagree, but I'm sticking to my >cost-benefit analysis: monetary costs are totally >germane. Yo

Re: Fw:Fraud & voting machines

2003-03-31 Thread David Wagner
Richard Guy Briggs wrote: >"If You Want To Win An Election, Just Control The Voting Machines" >by Thom Hartmann [...] >Six years later Hagel ran again, this time against Democrat Charlie Matulka >in 2002, and won in a landslide. As his hagel.senate.gov website says, Hagel >"was re-elected to his s