Re: Are there...one-way encryption algorithms

2003-11-26 Thread Peter Fairbrother
Bodo Moeller wrote:

> The Pohlig-Hellman cipher is the modular scheme that you describe, but
> observe there is a connection to the protocol above: that protocol
> works only if encryption and decryption has a certain commutativity
> property (decrypting  B(A(M))  with key  A   must leave  B(M),  not
> just some  A^-1(B(A(M)))  that might look entirely different), and
> the Pohlig-Hellman cipher has this property.

A useful property for all sorts of things. I'm using P-H to improve Golle et
al's universal encryption methods,
http://www.zenadsl6186.zen.co.uk/ICURpaper3.pdf but it's a pity that
Pohlig-Hellman is still slow, and that there isn't a faster algorithm with
similar properties.

There's lots of potential uses for one of those :)



-- 
Peter Fairbrother

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Are there...one-way encryption algorithms

2003-11-21 Thread David Wagner
Anton Stiglic wrote:
>"David Wagner" <[EMAIL PROTECTED]> wrote:
>> martin f krafft  wrote:
>> >  - Bob encrypts A(M) with key B and sends it to Alice
>> >  - Alice decrypts B(A(M)) with key A, leaving B(M), sends it to Bob
>> >  - Bob decrypts B(M) with key B leaving him with M.
>> >
>> >Are there algorithms for this already? What's the scheme called?
>>
>> It's called Pollig-Hellman.
>
>If I'm not mistaken you are wrong.

You're right.  The above protocol is essentially Shamir's 3-pass
protocol, not Pohlig-Hellman.

Pohlig-Hellman is the encryption scheme A(M) = M^A mod p.  If you
instantiate Krafft's proposal with the Pohlig-Hellman encryption scheme,
you get a working (and secure) instance of Shamir's 3-pass protocol.

Thank you for correcting my error!

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Are there...one-way encryption algorithms

2003-11-20 Thread Bodo Moeller
On Tue, Nov 18, 2003 at 09:19:48AM -0800, Anton Stiglic wrote:
> "David Wagner" <[EMAIL PROTECTED]>:
>> martin f krafft  wrote:

>>> it came up lately in a discussion, and I couldn't put a name to it:
>>> a means to use symmetric crypto without exchanging keys:
>>> 
>>>  - Alice encrypts M with key A and sends it to Bob
>>>  - Bob encrypts A(M) with key B and sends it to Alice
>>>  - Alice decrypts B(A(M)) with key A, leaving B(M), sends it to Bob
>>>  - Bob decrypts B(M) with key B leaving him with M.
>>>
>>> Are there algorithms for this already? What's the scheme called?

>> It's called Pollig-Hellman.

> If I'm not mistaken you are wrong.  Pohlig-Hellman proposed an encryption
> scheme based on discret log, the description of the OP was for a
> key transport protocol.
> In Pohlig-Hellman, what you do is have Alice and Bob share secret
> keys k and d such that k*d == 1 mod (p-1), where p is some prime.
> To encrypt a message M Alice computes M^k mod p, and Bob
> can decrypt by computing (M^k)^d mod p == M mod p.
[...]
> The algorithm that was described by the OP is really Shamir's
> three-pass algorithm, also known as Shamir's no-key protocol.

The Pohlig-Hellman cipher is the modular scheme that you describe, but
observe there is a connection to the protocol above: that protocol
works only if encryption and decryption has a certain commutativity
property (decrypting  B(A(M))  with key  A   must leave  B(M),  not
just some  A^-1(B(A(M)))  that might look entirely different), and
the Pohlig-Hellman cipher has this property.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Are there...one-way encryption algorithms

2003-11-19 Thread Enzo Michelangeli
Ah sure, that's why I said "irksome" and not "worrying" :-) It was more a
curiosity of theoretical nature than a practical concern.

Enzo

- Original Message - 
From: "Sidney Markowitz" <[EMAIL PROTECTED]>
To: "Enzo Michelangeli" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Tuesday, November 18, 2003 3:48 PM
Subject: Re: Are there...one-way encryption algorithms


> Enzo Michelangeli wrote:
> > but the slight risk of collision,
> > although practically negligible, is a bit irksome
>
> If you quantify the "practically negligible" risk, it might be less
> irksome: SHA-1 is a 160 bit hash. The birthday paradox says that you
> would need to hash 2^80 different credit card numbers before you had a
> 50% probability of having even one collision in your database keys. Very
> roughly that means you would need to have a trillion different credit
> card numbers in your database in order to get as much as a one in a
> trillion chance of a collision. You would probably find dealing with a
> trillion different credit card numbers more irksome than the negligible
> chance of a collision even that many would give you.
>
>   -- sidney
>

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Are there...one-way encryption algorithms

2003-11-19 Thread Anton Stiglic

"David Wagner" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]
> martin f krafft  wrote:
> >it came up lately in a discussion, and I couldn't put a name to it:
> >a means to use symmetric crypto without exchanging keys:
> >
> >  - Alice encrypts M with key A and sends it to Bob
> >  - Bob encrypts A(M) with key B and sends it to Alice
> >  - Alice decrypts B(A(M)) with key A, leaving B(M), sends it to Bob
> >  - Bob decrypts B(M) with key B leaving him with M.
> >
> >Are there algorithms for this already? What's the scheme called?
>
> It's called Pollig-Hellman.

If I'm not mistaken you are wrong.  Pohlig-Hellman proposed an encryption
scheme based on discret log, the description of the OP was for a
key transport protocol.
In Pohlig-Hellman, what you do is have Alice and Bob share secret
keys k and d such that k*d == 1 mod (p-1), where p is some prime.
To encrypt a message M Alice computes M^k mod p, and Bob
can decrypt by computing (M^k)^d mod p == M mod p.

This is commonly referred to as the Pohlig-Hellman symmetric-key
exponentiation cipher.

It is described in patent 4,424,414 which you can find here
http://patft.uspto.gov/netahtml/search-bool.html

Also mentioned in HAC, chapter 15, section 15.2.3, (iii).

The algorithm that was described by the OP is really Shamir's
three-pass algorithm, also known as Shamir's no-key protocol.

--Anton

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Are there...one-way encryption algorithms

2003-11-19 Thread Sidney Markowitz
Enzo Michelangeli wrote:
but the slight risk of collision,
although practically negligible, is a bit irksome
If you quantify the "practically negligible" risk, it might be less 
irksome: SHA-1 is a 160 bit hash. The birthday paradox says that you 
would need to hash 2^80 different credit card numbers before you had a 
50% probability of having even one collision in your database keys. Very 
roughly that means you would need to have a trillion different credit 
card numbers in your database in order to get as much as a one in a 
trillion chance of a collision. You would probably find dealing with a 
trillion different credit card numbers more irksome than the negligible 
chance of a collision even that many would give you.

 -- sidney

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Are there...one-way encryption algorithms

2003-11-17 Thread Enzo Michelangeli
Amir and others,

First, I'd like to thank all who have taken time to reply, either on- or
off-list.

All suggestions so far are related to public-key algorithms; I had myself
thought about simply raising a generator g to the plaintext, or to a
suitable injective function of the plaintext, in a GF(p): that doesn't
even require a key to throw away. One drawback is that, with the possible
exception of ECC-based methods, the minimum size of the cryptotext becomes
larger than I'd like.

Anyway, the intended use is for primary keys in transaction databases, in
replacement of the PAN (a.k.a. credit card number). Using secure hashes is
the usual way of doing such things, but the slight risk of collision,
although practically negligible, is a bit irksome (especially considering
that the plaintext is of fixed size, and therefore injectivity is not a
priori impossible), and I was wondering if something better can be done.

Enzo

- Original Message - 
From: "Amir Herzberg" <[EMAIL PROTECTED]>
To: "'Enzo Michelangeli'" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Sunday, November 16, 2003 10:44 PM
Subject: RE: Are there...one-way encryption algorithms


> Enzo asked,
> > Are there one-way encryption algorithms guaranteed to be injective
> > (i.e., deterministically collision-free)? Or are there
> > theoretical reasons against their existence?
> >
> > I'm looking for algorithms where every piece of code and data
> > is public, thus excluding conventional enciphering with a secret key.
>
> Sounds like you look for One Way Permutations... which of course exist
> (if one-way functions do). But before we get into details, it'll be
> useful if you specify your needs more precisely since imprecision is the
> mother of weaknesses and break-ins.
>
> BTW I've updated my foils on encryption and hashing which cover much of
> this topic (see in site if interested).
>
> Best, Amir Herzberg
> http://amir.herzberg.name
>
>

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Are there...one-way encryption algorithms

2003-11-17 Thread David Wagner
Enzo Michelangeli wrote:
>Anyway, the intended use is for primary keys in transaction databases, in
>replacement of the PAN (a.k.a. credit card number). Using secure hashes is
>the usual way of doing such things, but the slight risk of collision,
>although practically negligible, is a bit irksome (especially considering
>that the plaintext is of fixed size, and therefore injectivity is not a
>priori impossible), and I was wondering if something better can be done.

I'd ignore the risk.  If you've got a 160-bit hash function
(and you probably should), then the risk of a collision is truly
negligible.  If you try to come up with some fancy alternative,
there will be a greater risk that the fancy alternative is insecure
than the risk that you ever experience a collision in SHA.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


RE: Are there...one-way encryption algorithms

2003-11-16 Thread Amir Herzberg
Enzo asked, 
> Are there one-way encryption algorithms guaranteed to be injective 
> (i.e., deterministically collision-free)? Or are there 
> theoretical reasons against their existence?
> 
> I'm looking for algorithms where every piece of code and data 
> is public, thus excluding conventional enciphering with a secret key.

Sounds like you look for One Way Permutations... which of course exist
(if one-way functions do). But before we get into details, it'll be
useful if you specify your needs more precisely since imprecision is the
mother of weaknesses and break-ins. 

BTW I've updated my foils on encryption and hashing which cover much of
this topic (see in site if interested). 

Best, Amir Herzberg
http://amir.herzberg.name


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]