Cryptography-Digest Digest #565

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #565, Volume #13  Sat, 27 Jan 01 02:13:00 EST

Contents:
  Re: Between Silk and Cyanide ([EMAIL PROTECTED])
  Re: Dynamic Transposition Revisited (long) (John Savard)
  Re: Dynamic Transposition Revisited (long) ("Matt Timmermans")
  Re: Steak Stream Cipher ([EMAIL PROTECTED])
  32768-bit cryptography, updated ("lemaymd")
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: 32768-bit cryptography, updated ("Scott Fluhrer")
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Dynamic Transposition Revisited (long) (John Savard)
  Re: 32768-bit cryptography, updated ("Matt Timmermans")
  no joke (adam)



From: [EMAIL PROTECTED]
Subject: Re: Between Silk and Cyanide
Date: Sat, 27 Jan 2001 02:11:56 GMT

In article <_Kic6.67331$[EMAIL PROTECTED]>,
  "Roger Peniston-Bird" <[EMAIL PROTECTED]> wrote:
<< For instance, what happened to Giskes, who captured so many agents
sent to the Netherlands? Did he survive the war? >>

  Giskes not only survived the war, he wrote a book about the whole
affair.  An English translation was published in 1953 by British Book
Centre, Inc. and by William Kimber and Co, in London.  It was reprinted
in paperback by Bantam Books in 1982 under the title, London Calling
North Pole.

  I found it odd that Marks never mentions Giskes' book.  There was an
investigation in the Netherlands after the war, which seems to have
drawn considerable publicity in both the Netherlands and England, and I
suspect that the publication of Giskes' book was due entirely to the
controversy stirred up by this investigation, yet Marks takes no notice
of this in his book.

  -- Jeff Hill


Sent via Deja.com
http://www.deja.com/

--

From: [EMAIL PROTECTED] (John Savard)
Subject: Re: Dynamic Transposition Revisited (long)
Date: Sat, 27 Jan 2001 02:11:54 GMT

On Sat, 27 Jan 2001 01:20:23 GMT, [EMAIL PROTECTED] (Terry Ritter) wrote,
in part:

>There is simply no hope of being able to reach every possible
>conventional block cipher substitution "table" in the same way that
>Dynamic Transposition can reach every possible permutation.  

Absolutely! I agree with that 100%.

But what I'm on about is that that's a comparison between apples and
oranges.

Two rounds of DES with independent subkeys can produce 2^32 different
substitutions which will take any plaintext block P to any ciphertext
block C.

Similarly, "every possible permutation" can produce, for every N-bit
balanced block P, every possible N-bit balanced block C, in
(N/2)!(N/2)! different ways.

However, DES cannot produce every possible overall substitution, every
possible table C(0),C(1),C(2^64-1) of output ciphertext blocks
from input plaintext blocks.

And transposition, period, also cannot produce every possible overall
substitution, every possible table C() 
C() where the 12870 possible balanced 16-bit blocks,
(for N=16) are assigned, as ciphertext outputs, to the 12870 possible
balanced 16-bit blocks as inputs.

Transposition of balanced blocks is "better than XOR", because there
is more than one way to get from a particular P to a particular C, but
it does not have the sort of exhaustiveness that you are demanding a
substitution-based polyalphabetic block cipher have in order to be
comparable to Dynamic Transposition. The exhaustiveness it does have,
"all possible transpositions", is not equivalent.

Maybe it seems so because 'transposition' is treated as a class of
encipherment in itself, comparable to 'substitution'; this isn't a
semantic problem, it's a conceptual problem; I think you may be a
victim of the Whorf hypothesis, that language limits how we can think.

John Savard
http://home.ecn.ab.ca/~jsavard/crypto.htm

--

From: "Matt Timmermans" <[EMAIL PROTECTED]>
Subject: Re: Dynamic Transposition Revisited (long)
Date: Sat, 27 Jan 2001 02:28:25 GMT


"AllanW" <[EMAIL PROTECTED]> wrote in message
news:94sl80$alu$[EMAIL PROTECTED]...
> I think I missed one of my classes when I learned programming.
> Could you please show me the code corresponding to "generate a
> photon?" Use any well-known computer language -- ADA, APL,
> BASIC, C, C++, COBOL, FORTRAN, PASCAL -- whatever you feel
> comfortable with. I just need to see the basic algorithm for
> "generate a photon."

It sounds more like you missed the drunken argument in the college bar about
the feasibility of strong AI, the limits of simulation, the possibility that
that nature can support useful modes of super-Turing computation, who that
girl in the corner is _really_ checking out, and whether or not Bob tries to
coerce his partners into cheating at Euchre.




--

From: [EMAIL PROTECTED]
Subject: Re: Steak Stream Cipher
Date: Sat, 27 Jan 2001 02:33:08 GMT

In article <94t6g3$qai$[E

Cryptography-Digest Digest #564

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #564, Volume #13  Fri, 26 Jan 01 21:13:00 EST

Contents:
  Last revision ("lemaymd")
  Re: solving simultaneous equations in modulo arithmetic ("Matt Timmermans")
  Re: RSA Source code ("Adam Smith")
  Re: Decode Algorythim ("Yeah")
  Re: Steak Stream Cipher (Bryan Olson)
  Random Number Generator ([EMAIL PROTECTED])
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Paranoia ("Douglas A. Gwyn")
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Random Number Generator ("Douglas A. Gwyn")
  Re: Dynamic Transposition Revisited (long) ("Douglas A. Gwyn")



From: "lemaymd" <[EMAIL PROTECTED]>
Subject: Last revision
Date: Fri, 26 Jan 2001 18:31:18 -0600

Thanks for those final pieces of advice!  I've modified my algorithm for
hopefully the last time using your suggestion and Joseph Ashwood's.  He said
as I understand it that having eight encryption rounds doesn't do much
except slow my algorithm down.  So without further ado, here it is:(an
excerpt from my documentation)

3. Description of algorithm

a. Key mutation

Encryption using the Bermuda Triangle 2.1 algorithm consists of several
steps consisting of XOR, rotate and addition operations, involving three key
derived values.  It operates with 32768-bit plaintext and ciphertext blocks
controlled by a 32768-bit key, referred to as K0.  The principal advantage
of this algorithm is the requirement that the entire key be known before any
decipherment can take place.  This is insured by two key mutations,
described here.
The first key derivative is created by loading the first byte of K0, storing
it in a register and to memory, loading the next byte and XORing it against
the register containing the first byte, storing the register contents to the
next memory location and loading each subsequent byte in this manner, XORing
it against this register and storing it to memory.  This key derivative is
referred to as K1.  The original key, once again, is referred to as K0.
To form the second key derivative the entire key is loaded one byte at a
time from the end of the key to its beginning, stored to a register, XORed
and stored to a memory location as for K1.  Note: the last byte in this
memory area will always equal the original key data.  This key is referred
to as K2.  These keys are now ready to be used in the encryption and
decryption processes.

b.   Encryption

The actual encryption process involves one round of twelve XOR, addition and
bitwise rotation operations involving the three key mutations described
earlier and the original plaintext.  The identification tag described in
section 2 is placed in the first twelve bytes of this file.
 The steps involved are illustrated in this pseudocode segment:

Variables:
C Ciphertext
Kx Key "x"
P Plaintext
X Current byte position
Y Current key offset
Z General purpose register


C[x] = ( ( ( ( ( ( ( ( ( ( ( (
^ K2[y] ) + K1[y] ) >>> K0[y] )
^ K1[y] ) + K2[y] ) >>> K1[y] )
P[x] ^ Z ) + Z ) <<< Z{5lsbits} )
^ K0[y] ) + K0[y] ) >>> K2[y] )

Z = (Z^P[x])

Legend:
^   XOR
+   addition
<<< rotate left
>>> rotate right


"Scott Fluhrer" <[EMAIL PROTECTED]> wrote in message
news:94lo0p$j71$[EMAIL PROTECTED]...
>
> lemaymd <[EMAIL PROTECTED]> wrote in message
> news:94l9ds$k2m$[EMAIL PROTECTED]...
> > Poncho,
> > From what you've written, it's looks as though simplicity is not
this
> > cipher's weakness.  What path would you suggest to strengthen it?   I
> don't
> > truly understand how you would retrieve a completely random key (which
of
> > course it's not, but for simplicity let's say it is)  when you have only
> the
> > ciphertext.  Theoretically, as is the case with the true stream cipher,
> one
> > XOR operation between the key and data should be sufficient to make an
> > entirely impossible to crack piece of ciphertext.  Because of the huge
> size
> > of the key utilized by this algorithm, it almost qualifies as a stream
> > cipher itself.  Thanks for your valuable input!  : - )
> If an attacker had only one block of unknown plaintext, that would likely
be
> the case.  It would appear to be difficult to retrieve either the key or
the
> plaintext, and it would obviously be totally impossible for an XOR
> operation.  However, if the attacker has multiple blocks encrypted under
the
> same key, that changes radically.  If you look at my suggested attack, you
> use one block to guess key bits, and another block (or more likely,
several
> blocks) to verify the guess.
>
> As for what this cipher's weakness, it would appear to me caused by
several
> things:
>
> - Lack of diffusion between plaintext bits -- the value of one byte never
> affects the value of another byte.  This means (for example) if the
attacker
> leaves that a plaintext "W" at offset 27 encrypts into the byte 0xf3, then
> he knows that, for any other block, a ciphertext byte 0xf3 at offset 27
> implies that the plainte

Cryptography-Digest Digest #563

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #563, Volume #13  Fri, 26 Jan 01 20:13:01 EST

Contents:
  Re: Dynamic Transposition Revisited (long) (John Savard)
  Re: What do you do with broken crypto hardware? (Paul Rubin)
  Re: Cryptographic Camouflage (Thomas Wu)
  Re: What do you do with broken crypto hardware? (David Schwartz)
  Re: Why Microsoft's Product Activation Stinks (Splaat23)
  RSA Source code ("Adam Smith")
  Re: Mr Szopa's encryption (was Why Microsoft's Product Activation  Stinks) (Alan 
Mackenzie)
  Re: Why Microsoft's Product Activation Stinks (Splaat23)
  Re: Why Microsoft's Product Activation Stinks (Splaat23)
  Re: RSA Source code (Paul Rubin)
  Re: RSA Source code ("Joseph Ashwood")
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)



From: [EMAIL PROTECTED] (John Savard)
Subject: Re: Dynamic Transposition Revisited (long)
Date: Fri, 26 Jan 2001 23:30:36 GMT

On Fri, 26 Jan 2001 21:48:40 GMT, [EMAIL PROTECTED] (Terry Ritter) wrote,
in part:

>The DES keyspace is 56 bits, a value 2 bits long.

>Let's see:  A value 10**21 bits long compared to a value 2 bits long.
>Yeah, I'd say "some" were impossible to reach.  

Actually, 56 is a 6-bit-long binary number. And DES doesn't have 56
different keys, it has 2^56 different keys, as noted below.

>The DES keyspace is such a tiny fragment of the potential keyspace
>that there is no assurance at all that it retains the smooth
>theoretical properties of distribution for which we might hope.  

quoting me:
>>Well, by shuffling, I can't reach a total overall pairing of bit
>>balanced inputs to bit balanced outputs such that
>>
>> -> 
>>
>>and
>>
>>00101011 -> 
>
>Why not?  What does that mean?  Are you criticizing the balancing
>algorithm?  Fine, use another.

This has nothing to do with the balancing algorithm.

This is about Dynamic Transposition itself.

All possible N! transpositions of an N-bit block may be effected.

However, 16! is also a tiny fraction of 12870!, just as 2^56 (not 56)
is a tiny fraction of (2^64)!.

If our PRTG - pseudorandom transposition generator - generates the
transposition

9 12 14 16 15 11 10 13 3 5 1 2 7 6 4 8

then if the plaintext was



the ciphertext will be

000

and if the plaintext was

00101011

the ciphertext would be instead

11011000

note that just as we have switched two bits in our plaintext, we have
switched two bits in our ciphertext.

A substitution cannot be reached by means of any transposition that
will at the same time take



to



and take

00101011

to



since we are inverting a different number of bits in the plaintext and
the ciphertext.

Thus, as with DES, some total overall mappings, considering the whole
ensemble of (plaintext, ciphertext) pairs generated at a single point
in the process, are unreachable.

This is not so much a criticism of Dynamic Transposition itself as of
your claim that it is vastly superior to DES with
stream-cipher-generated subkeys.

John Savard
http://home.ecn.ab.ca/~jsavard/crypto.htm

--

From: Paul Rubin <[EMAIL PROTECTED]>
Subject: Re: What do you do with broken crypto hardware?
Date: 26 Jan 2001 15:48:42 -0800

Nicol So <[EMAIL PROTECTED]> writes:
> > Maybe I'm overly paranoid but the encrypted external keys are in disk
> > files on the application host, and I'm going by the assumption that
> > the online application host is completely insecure.  
> 
> I'm not familiar with your application, but it sounds dangerous if the
> application host is completely insecure.

To clarify: we do all the usual things to make the host secure, but
despite this I assume there's a chance it can be compromised, and
that's what the module is supposed to protect against.

--

From: Thomas Wu <[EMAIL PROTECTED]>
Subject: Re: Cryptographic Camouflage
Date: 26 Jan 2001 15:50:23 -0800

Mok-Kong Shen <[EMAIL PROTECTED]> writes:

> Thomas Wu wrote:
> > 
> > Mok-Kong Shen <[EMAIL PROTECTED]> writes:
> > 
> > > Darren New wrote:
> > > >
> > > > I.e., it looks like it's protecting against offline searches of passwords
> > > > you can only truely verify online.
> > > >
> > > > Of course, that's just my interpretation. Read the actual patent for what
> > > > they're actually covering.
> > >
> > > Thank you very much. For, trusting that you are right, I don't
> > > think I would spend time to study the detailed document.
> > >
> > > So it seems that it is virtually the 'employment' of a checksum
> > > that gets patented. When I was in school, solving some systems
> > 
> > Huh?  It's just the opposite.  Having a checksum (MAC, etc.) that
> > validates a password guess is exactly what camouflage avoids.
> > By removing this checksum, and doing some other cleverness, you
> > get a blob of data that leaks no info

Cryptography-Digest Digest #562

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #562, Volume #13  Fri, 26 Jan 01 19:13:01 EST

Contents:
  Re: Producing "bit-balanced" strings efficiently for Dynamic  ("Tony T. Warnock")
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Dynamic Transposition Revisited (long) (Mok-Kong Shen)
  Encoded serial number:Help! (Giannikol)
  Q: solving simultaneous equations in modulo arithmetic (G. Ralph Kuntz, MD)
  Re: Some Enigma Questions (Neil Sluman)
  Re: Random stream testing. (long) ("Joseph Ashwood")
  Re: Some Enigma Questions (John Savard)
  Re: Some Enigma Questions (John Savard)
  Re: Producing "bit-balanced" strings efficiently for Dynamic  Transposition (Terry 
Ritter)
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Dynamic Transposition Revisited (long) (John Savard)
  Re: Why Microsoft's Product Activation Stinks (Lord Running Clam)
  Re: Dynamic Transposition Revisited (long) ("Paul Pires")



From: "Tony T. Warnock" <[EMAIL PROTECTED]>
Subject: Re: Producing "bit-balanced" strings efficiently for Dynamic 
Date: Fri, 26 Jan 2001 15:19:06 -0700
Reply-To: [EMAIL PROTECTED]

Arbitrary 37 bit strings will fit into 40 bits. 2**37 is just larger
than 40!/20!**2. I didn't check to see if the suggested algorithm would
actually work.


--

From: [EMAIL PROTECTED] (Terry Ritter)
Subject: Re: Dynamic Transposition Revisited (long)
Date: Fri, 26 Jan 2001 22:21:52 GMT


On Fri, 26 Jan 2001 09:07:03 -0800, in
<[EMAIL PROTECTED]>, in sci.crypt "Paul Pires"
<[EMAIL PROTECTED]> wrote:

>[...]
>I also am not clear on the goal. Yes there needs to be bit balancing so that
>a bias in the input is not recognizable in the output but by doing this
>hiding,
>don't you sacrafice another valuable property? Seems like the output would
>fail a taylored randomness test. You are going to get data that has a
>prefect
>distribution of zero's and ones within a block and something else if the
>block
>reference is displaced. Right?

It is not necessary for strength or security that a cipher to produce
random-like output.  Most ciphers do so, but such is not necessary.
Here I think the possible output codes do appear with equal
probability.  

This is a characteristic which represents the inefficiency of balanced
coding.  But since that is a plaintext coding, and is known by both
designer and opponent, it does not seem particularly worrisome.  


>Seems like what you'd want would be a method where the transposition
>works on a pile that is "Probably" balanced but where the deviation from
>perfect is not correlated to the input or output. I could be screwy here.

I have mentioned the possibility of a statistical or "almost" balance,
which could be very effective.  But it seems like that analysis would
be much more complicated.  We would have to talk about the
distribution of balance, and how strength changes accordingly, which
seems beyond what can now be done.  

---
Terry Ritter   [EMAIL PROTECTED]   http://www.io.com/~ritter/
Crypto Glossary   http://www.io.com/~ritter/GLOSSARY.HTM


--

From: [EMAIL PROTECTED] (Terry Ritter)
Subject: Re: Dynamic Transposition Revisited (long)
Date: Fri, 26 Jan 2001 22:25:04 GMT


On Fri, 26 Jan 2001 12:07:40 -0700, in
<[EMAIL PROTECTED]>, in sci.crypt "Tony T. Warnock"
<[EMAIL PROTECTED]> wrote:

>I have a suggestion for the initial statistical-balance step (to reduce
>the later balance extensions.) XOR the input with a DeBruijn sequence.
>For example a simple method would be to XOR the sequence 0101010101
>Better would be 001100110011 and even better 0001011100010111 In
>the latter case, the XORing sequence is one byte long so one might
>improve things by rotating this sequence between bytes.  Longer
>sequences are possible 10011010 could be used on pairs of
>bytes--with rotation.

If we are going to process plaintext with a known sequence, why should
any particular balanced sequence be better than any other?  It seems
like there will always be some plaintext that will not be helped, or
would in fact be made worse.

---
Terry Ritter   [EMAIL PROTECTED]   http://www.io.com/~ritter/
Crypto Glossary   http://www.io.com/~ritter/GLOSSARY.HTM


--

From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Re: Dynamic Transposition Revisited (long)
Date: Fri, 26 Jan 2001 23:26:55 +0100



Terry Ritter wrote:
> 
> Mok-Kong Shen<[EMAIL PROTECTED]> wrote:

> >After some re-thinking, I do like to elaborate a little
> >a previous point of mine concerning the question of
> >perfectness of DT.
> >
> >Suppose we have block size of n and we agree not to use
> >the non-balanced groups of bits but only the balanced
> >ones to transmit informations (in other words, we have
> >an 'alphabet' of a certain size m that is less than n). This
> >serves to separate out the 

Cryptography-Digest Digest #561

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #561, Volume #13  Fri, 26 Jan 01 17:13:01 EST

Contents:
  Re: Dynamic Transposition Revisited (long) (AllanW)
  Re: Dynamic Transposition Revisited (long) ("Tony T. Warnock")
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Some Enigma Questions (JimD)
  Re: Echelon in Asia. (JimD)
  Re: Dynamic Transposition Revisited (long) (John Savard)
  Re: Fitting Dynamic Transposition into a Binary World (Terry Ritter)



From: AllanW <[EMAIL PROTECTED]>
Subject: Re: Dynamic Transposition Revisited (long)
Date: Fri, 26 Jan 2001 20:49:45 GMT


> AllanW <[EMAIL PROTECTED]> wrote:
> >As I understood the filler bits to work, the data would
> >look like this before the transposition begins: if the
> >data had more 0-bits than 1-bits, it would take the form
> >XXXX 00..00 11..11
> >where X bits represent the data, and then there are 1-8
> >0-bits followed by 1 or more 1-bits.

I see now that I should have said, 1-7 0-bits and then
1 or more 1-bits.

> >If the data has
> >more 1-bits than 0-bits, simply reverse the filler:
> >XXXX 11..11 00..00
> >this time using 1-8 1-bits and then 1 or more 0-bits.

And here I should have said: 1-7 1-bits and then 1 or
more 0-bits.


> >[EMAIL PROTECTED] (Terry Ritter) wrote:
> That does not seem to be the way I did it.

That's what I got out of it. Not word-for-word, of course.

> I don't understand having both 0's and 1's balancing bytes.

Surely you do...? It is so that we can always remove the balancing
bytes without removing any meaningful data.

What if the block has 16 more 0-bits than 1-bits, but the last byte
of plaintext is 0x0F? You could balance the block by adding 2 more
bytes of 0xFF, but then after decryption we could not identify the
first byte of filler (as you say below: the mixed byte must be
mixed to be a flag).

> If we have an excess of 0's, we want any full balancing bytes to
> be all 1's, with the mixed byte being what it needs to be.  Since
> the mixed byte must be mixed to be a flag, it cannot balance a
> full 8 bits, but at most 6 (1000  is an excess of 6 0's).

Yes, exactly. And then following this, we have bytes with all
1-bits.

I suppose that what I wrote above (1-7 0-bits, followed by 1 or more
1-bits) was stronger than absolutely needed. The mixed byte could be
randomly mixed as well, so instead of using 1000- we could just
as easily have used 0001-. Is there any reason to do this
randomly? If not, then my description fits the same pattern but is
easier to describe.

> >Another way to say this is to show what the filler
> >would look like for various imbalances. Here I'll
> >assume that the data has more 0-bits than 1-bits; use
> >the complement if the opposite is true.
> >
> >  If there are B more 0-bits than 1-bits, then the
> >  filler looks like (in hex):
> >
> >  B=0   0F
> >  B=2   1F
> >  B=4   3F
> >  B=6   7F
> >  B=8   0FFF
> >  B=10. 1FFF
> >  B=12. 3FFF
> >  B=14. 7FFF
> >  B=16. 0F
> >  B=18. 1F
> >  B=20. 3F
> >  B=22. 7F
> >  B=24. 0FFF
> >...and so on.
>
> Looks right.

Good, because in every case the first balance byte starts
with 1-4 0-bits followed by 1-7 1-bits.

--
[EMAIL PROTECTED] is a "Spam Magnet," never read.
Please reply in newsgroups only, sorry.


Sent via Deja.com
http://www.deja.com/

--

From: "Tony T. Warnock" <[EMAIL PROTECTED]>
Subject: Re: Dynamic Transposition Revisited (long)
Date: Fri, 26 Jan 2001 14:08:19 -0700
Reply-To: [EMAIL PROTECTED]

The efficiency of the balanced pre-substitutions can be improved by
taking more bits. Of course a table-lookup gets too big rather quickly.

Output   Input
Size  Length  Expansion
  6   450.0%
  8   6 33.3%
10   7 42.9%
12   9 33.3%
14 11 27.3%
16 13 23.1%
18 15 20.0%
20 17 17.6%
22 19 15.8%
24 21 14.3%
26 23 13.0%
28 25 12.0%
30 27 11.1%
32 29 10.3%
64 60   6.7%
  128   124   3.2%
  256   251   2.0%
  512

Cryptography-Digest Digest #560

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #560, Volume #13  Fri, 26 Jan 01 16:13:01 EST

Contents:
  Re: Dynamic Transposition Revisited (long) (AllanW)
  Re: What do you do with broken crypto hardware? (David Schwartz)
  Re: What do you do with broken crypto hardware? (David Schwartz)
  Re: Dynamic Transposition Revisited (long) (AllanW)
  Re: Paranoia (William Hugh Murray)
  Re: Encryption Program (Richard Heathfield)
  Re: Q: File Extension .$#! - Which Encryption Program?!? (Jim Gillogly)
  Re: History Question: signatures in nuclear test ban verification? (Doug Stell)
  Re: Dynamic Transposition Revisited (long) (Richard Heathfield)
  Re: Encryption Program ("Joseph Ashwood")
  Re: Steak Stream Cipher ([EMAIL PROTECTED])
  Re: Dynamic Transposition Revisited (long) (John Savard)
  Re: Dynamic Transposition Revisited (long) (John Savard)
  Re: Dynamic Transposition Revisited (long) (John Savard)
  Re: Dynamic Transposition Revisited (long) (John Savard)
  Re: Random stream testing. (long) ("Paul Pires")
  Re: Q: File Extension .$#! - Which Encryption Program?!? (Thomas Propst)



From: AllanW <[EMAIL PROTECTED]>
Subject: Re: Dynamic Transposition Revisited (long)
Date: Fri, 26 Jan 2001 20:04:24 GMT

"Matt Timmermans" <[EMAIL PROTECTED]> wrote:
> In all likelyhood, that would be a very practical generator for OTP
keys,
> and it would be reasonably easy to purposely underestimate the amount
of
> entropy you're getting.  If you want proof, though, you should do
something
> different.  For instance:
>
> Generate a photon, and polarize it vertically.  Then measure its
> polarization at 45 degrees from the vertical.  Repeat.
>
> By measuring the transparency of your optics, the sensitivity of your
> photomultipliers, and the orientation of your polarizers, you can
place a
> very confident lower bound on the rate of real randomness.

I think I missed one of my classes when I learned programming.
Could you please show me the code corresponding to "generate a
photon?" Use any well-known computer language -- ADA, APL,
BASIC, C, C++, COBOL, FORTRAN, PASCAL -- whatever you feel
comfortable with. I just need to see the basic algorithm for
"generate a photon."

Wait, I think I see a photon now -- no, it's gone. I probably
just imagined it.


--
[EMAIL PROTECTED] is a "Spam Magnet," never read.
Please reply in newsgroups only, sorry.


Sent via Deja.com
http://www.deja.com/

--

From: David Schwartz <[EMAIL PROTECTED]>
Subject: Re: What do you do with broken crypto hardware?
Date: Fri, 26 Jan 2001 12:19:48 -0800


Nicol So wrote:

> I'm not familiar with your application, but it sounds dangerous if the
> application host is completely insecure. Besides preventing someone from
> extracting secrets from the security module, don't you want to control
> how the module's functions are exercised, and who can exercise it? I
> suspect that you need to provide some level of security to the host
> anyway.

I think you're missing the entire point of having a secure module. The
point of the module is to isolate failures. That is, with a secure
module, the worst case scenario for a compromised host is supposed to be
that they can perform encryptions and decryptions for as long as the
host is compromised. If the keys themselves are accessible through a
compromised host, then a compromised host equals a compromised key. That
defeats the purpose of having the module.

> Let's assume that the encrypted keys are fairly well protected so that
> there's a low but non-zero probability that an adversary can get to it,
> but without physical access it is impossible to extract the secrets from
> the security module. For adversaries coming in from a network, their
> lives are not made easier. For insiders such as bad admins, their
> attacks are not made harder, but not easier either. For the module
> manufacturer as an adversary, who's best positioned to defeat/bypass the
> module's physical security, they now have an additional barrier to
> overcome. That may be an improvement.

That's a big step down in security from what the module is supposed to
provide.

DS

--

From: David Schwartz <[EMAIL PROTECTED]>
Subject: Re: What do you do with broken crypto hardware?
Date: Fri, 26 Jan 2001 12:17:11 -0800


Paul Rubin wrote:

> This doesn't make sense--the whole point of the tamper resistant
> module is to securely store keys internally.  Any keys stored outside
> the module are vulnerable to copying and therefore must be encrypted;
> but then in order to load them into the module, the decryption key
> must be stored inside the module.  So if the module is sent back to
> the manufacturer, all the keys are potentially compromised.

Yes, you can't have it both ways. If the module can decrypt the keys,
then you're not safe from anyone who has both the module and the
encrypted keys. If you are assum

Cryptography-Digest Digest #559

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #559, Volume #13  Fri, 26 Jan 01 15:13:01 EST

Contents:
  Re: Dynamic Transposition Revisited (long) (AllanW)
  Re: Snake Oil (SCOTT19U.ZIP_GUY)
  Re: Knots, knots, and more knots (Matthew Montchalin)
  Re: Decode Algorythim ("Joseph Ashwood")
  Re: Steak Stream Cipher ("Joseph Ashwood")
  Re: Mr Szopa's encryption (was Why Microsoft's Product Activation  Stinks) ("Joseph 
Ashwood")
  Re: Why Microsoft's Product Activation Stinks (Anthony Stephen Szopa)
  Encryption Program (Benjamin)
  Re: What do you do with broken crypto hardware? (Bill Unruh)
  Q: File Extension .$#! - Which Encryption Program?!? (Thomas Propst)



From: AllanW <[EMAIL PROTECTED]>
Subject: Re: Dynamic Transposition Revisited (long)
Date: Fri, 26 Jan 2001 19:33:06 GMT

  [EMAIL PROTECTED] (Terry Ritter) wrote:
>
> On Tue, 23 Jan 2001 08:29:16 -0800, in
> <[EMAIL PROTECTED]>, in sci.crypt "John A. Malley"
> <[EMAIL PROTECTED]> wrote:
>
> >Terry Ritter wrote:
> >>
> >[snip]
> >
> >> >This may be a good place to continue the cryptanalysis of the
strength
> >> >of the DT cipher.  A PRNG with N! states to make every
permutation of
> >> >the bits in an N bit block can only generate some of the possible
> >> >sequences of permutations.  There are (N!)! possible sequences of
> >> >permutations.
> >>
> >> There are (N!)**S possible sequences of permutations, of sequence
> >> length S.
> >
> >Please help - where did I go wrong in calculating the total number of
> >possible sequences of the N! total possible permutations?
> >
> >Here's my reasoning -
> >
> >Given N bits there are N! different, unique ways to permute those
bits -
> >the N! unique permutations. They make a set P.
> >
> >I number the permutations in the set from 1 to N!.  How many
different
> >ways can I sequence the members of the set of permutations? Or in
other
> >words, how many different ways can I write down (list) the elements
of
> >P?  Let the number of elements in P be M, so
> >M = N!. The number of unique listing sequences of the M  elements is
the
> >number of permutations of the M elements of P, which is M!. Since M =
> >N!, then M = (N!)!.
> >
> >So that's how I derived the number of ways the individual elements of
> >the set of permutations of an N bit block can be listed out as a
> >sequence.
>
> OK, I had no idea what you were doing.  Of course, I still have no
> idea where you are going.  Do you have any idea how big (N!)! is?
> Even 128! is 3.85620482e+215, and the factorial of that is some number
> which is about 2.75610295e+218 bits long.  (From
>
>http://www.io.com/~ritter/JAVASCRP/PERMCOMB.HTM#Factorials
>
> ).
>
> Surely, there is no reason to imagine that permutations must all occur
> before repeating.  In fact, that would be a weakness.
>
> The design goal is to allow the very same permutation to occur on the
> next block, and then rely on the almost infinitesimal probability of
> any particular permutation occurring to be assured that it will almost
> never happen.  The goal is to make the permutation selection for each
> and every block independent, with equal probabilities.
>
> We can see the selected permutation as a "value," in a sequence of
> values, exactly the same way we get random values from an RNG, or the
> way we think of sequences as some number of symbols, each one chosen
> from a set.  It is a weakness for a random generator to produce a
> value which will not then re-occur until the generator recycles.
>
> >> >AFAIK it's safe to say the PRNG generates N! sequences
> >> >(assuming the set of seed values is equal to the set of possible
outputs
> >> >of the PRNG, both sets are of order N!.) Only N!/ (N!)! of the
sequences
> >> >can ever be seen.
> >>
> >> ??
> >
> >There are M! ways to list the M values from 1 - M.
>
> These are called permutations.
>
> >A PRNG outputs lists
> >(sequences) of the values between 1-M.
>
> Some RNG's are like that.  Don't do that.
>
> >The PRNG starts from a seed
> >value s and makes a list of the M values.  Each list is different.
The
> >PRNG can only make as many unique lists of the M values are there are
> >unique seeds s.  Let the order of the set S of seed values be K.
Then
> >the PRNG can only make K out of M! listings (sequences) of the M
values
> >from 1 - M.  So the PRNG only produces a fraction K / M! of the total
> >possible sequences of the M values.
>
> Internally, there is some concept of a huge cycle which is shuffled by
> an RNG -- the internal state -- but that concept is not necessarily
> the output value.  Surely, when we have a huge internal state, we do
> not imagine that we must take the whole amount of that state as the
> RNG result.  When we do not, any particular value can re-occur on the
> very next RNG step.
>
> The Additive RNG is discussed in Knuth II.  And even though those are
> tiny, it should be clear that, in an Additive RNG, values can and do
> repeat.  The intent is to

Cryptography-Digest Digest #557

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #557, Volume #13  Fri, 26 Jan 01 15:13:01 EST

Contents:
  Re: Why Microsoft's Product Activation Stinks ("David C. Barber")
  Between Silk and Cyanide ("Roger Peniston-Bird")
  Re: Why Microsoft's Product Activation Stinks (Lord Running Clam)
  Re: Why Microsoft's Product Activation Stinks ("Paul Pires")
  Re: Why Microsoft's Product Activation Stinks ("Joe Green")
  Re: Decode Algorythim (Mike Rosing)
  Re: Dynamic Transposition Revisited (long) ("Tony T. Warnock")
  Re: finding inverses and factoring (Bryan Olson)
  Re: Paranoia (digiboy | marcus)
  Re: How many bits of security can a password give? ("Joseph Ashwood")
  Re: RC4 Security ("Joseph Ashwood")
  Re: Random stream testing. (long) ("Joseph Ashwood")
  Re: TSEPRNG, a secure RNG ? ("Joseph Ashwood")
  Re: Cryptographic Camouflage ("Joseph Ashwood")



From: "David C. Barber" <[EMAIL PROTECTED]>
Crossposted-To: or.politics,talk.politics.crypto,misc.survivalism
Subject: Re: Why Microsoft's Product Activation Stinks
Date: Fri, 26 Jan 2001 10:42:15 -0700

"Richard Heathfield" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...

> Yes, indeed. I think it sums up one of the points nicely. If Microsoft
> want copy protection to actually work, they need to do it in hardware.
> That way, the cost of making a copy is likely to exceed the cost of
> buying one in the shops. Of course, I'm not convinced that anyone's
> going to buy any Microsoft hardware more complicated than a mouse, but
> that's for each user (or IT dept) to decide, of course.

Now there's a thought.  Include unlock information in a MS mouse making it a
combination mouse/dongle.  The cost of the extra mouse h/w would likely be
more than recovered by increased revenues due to the reduction in piracy.

This is MY idea, published here.  You must PAY ME to use it, and quote it as
Prior Art in any patent application.  :^)

*David Barber*



--

From: "Roger Peniston-Bird" <[EMAIL PROTECTED]>
Subject: Between Silk and Cyanide
Date: Fri, 26 Jan 2001 17:47:38 GMT

I happened to be rereading Leo Marks' book when I heard the sad news of his
death.

It's a fascinating book, sad, funny, moving, exasperating, deep, flippant...
and frustrating that it raises a lot of questions that it does not answer,
For instance, what happened to Giskes, who captured so many agents sent to
the Netherlands? Did he survive the war? What was the system whereby
Pandarus could pass on security checks to other agents without being able to
remember them himself?

It also appears from Silk and Cyanide that 'indecipherables' were tackled by
SOE's FANYs with no more sophisticated equipment than squared paper, whilst
Bletchley was using 'bombes', punched tape, etc. True or false? And did
anyone think of trying to use ULTRA material to check whether the Dutch
network was compromised? What did Marks know of ULTRA?

However, what frustrated me most was chapter 5, in which Marks shows how to
crack messages in the poem code  'with a depth of two'.

For a start, the initial crib uses a (deliberate) misprint... a misspelling
of the name 'Ozanne'. ( In practice this would be like trying to crack a
cypher by using "De Gaullle" as a crib instead of "De Gaulle"). And then,
comparing the coded messages (p. 46 in the paperback) with the original ones
(p54) one discovers there is an F in the original first message and none in
the scrambled version, i.e. pair No.42 on page 54 is not to be found on
p.46. And conversely pair No.53 on p.46 does not occur on P 54.

When he has cracked the cyphers, Marks breaks the news to Ozanne that if one
can determine the process that results in the original letters changing
their positions between the original message and its encipherment, one would
be in possession of the transposition key by which both messages had been
encoded and hence be able to decrypt any other message based on the same
key, "The mathematics  involved would be basic but fiddling, and I asked
Ozanne if he would like to see the process for himself or accept my word
that within a very short time we could mathematically construct the entire
transposition key... My word was instantly accepted."

So, alas, we are not enlightened as to how the transposition key was
reconstructed, but are simply told it starts 1,16,17, 23 etc.

In chapter 3 (p32-3)  Marks tells us all messages were encoded on a pair of
transposition keys. Once he had encoded his message using the first one, the
agent had to reencode it using a second transposition key based on another
five words from his poem."The agent used his transposition keys to put his
clear text through a series of complex convolutions.." but that  if the
Germans had broken one of his messages they could mathematically
reconstruct the words of the poem the agent used as the basis for his
initial transposition."

At this point I am left wondering how, g

Cryptography-Digest Digest #558

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #558, Volume #13  Fri, 26 Jan 01 15:13:01 EST

Contents:
  Re: Windows encryption: API and file system (Ray Dillinger)
  Re: Dynamic Transposition Revisited (long) (Mok-Kong Shen)
  Re: Dynamic Transposition Revisited (long) (AllanW)
  Re: Why Microsoft's Product Activation Stinks (Anthony Stephen Szopa)
  Re: Dynamic Transposition Revisited (long) (AllanW)
  Re: Why Microsoft's Product Activation Stinks (Anthony Stephen Szopa)
  Re: Dynamic Transposition Revisited (long) (Mok-Kong Shen)



From: Ray Dillinger <[EMAIL PROTECTED]>
Subject: Re: Windows encryption: API and file system
Date: Fri, 26 Jan 2001 19:13:22 GMT

It's not merely sloppy engineering...  Think about it.  It would 
have been just as easy to create the temporary file as an encrypted 
file in the first place, then copy it back over the file being 
encrypted, and *then* delete it.  

To call this "sloppy" is to believe that the engineer selected these 
operations and then didn't think *at all* about what order to apply 
them in.  Which, I guess, you may believe if you care to, but I don't 
think anyone that flatout stupid can be an engineer in the first place.

I don't think Microsoft is in the security business at all.  I think 
that they are in the business of providing the *illusion* of security 
while still selling out ^H^H^H^H^H^H^H^H uh, "providing for the 
legitimate needs of law enforcement and data theives".  Real security 
scares the bejabbers out of them and they're fighting it every step 
of the way.

Bear



Ben Newman <[EMAIL PROTECTED]> wrote:
: This is an excellent start. I was hoping for a more detailed discussion of
: how an OS can secure files, and how Windows has implemented their encryption
: protocol.

: This bug is just plain sloppy engineering!

: --ben
: "Bryan Mongeau" <[EMAIL PROTECTED]> wrote in message
: news:VUYb6.6219$[EMAIL PROTECTED]...
:> Ben Newman wrote:
:>
:> > I'd like to learn more about criticisms of the Windows cryptography
:> > implementation. In response to an earlier post, someone characterized it
:> > as "practically useless." This seems like a particularly important issue
:> > given the amount of knowledge your average Windows user has about
: crypto.
:> >
:> > --ben
:> >
:> >
:>
:> I don't know if this what you mean but I saw this on Bugtraq
:> a few days ago:
:>
:> --
:> BugTraq: EFS Win 2000 flaw
:> From: Rickard Berglind <[EMAIL PROTECTED]>
:> To: [EMAIL PROTECTED]
:> Date: Fri, 19 Jan 2001 12:29:50 +0100
:>
:>
:> I have found a major problem with the encrypted filesystem
:> ( EFS ) in Windows 2000 which shows that encrypted files
:> are still very available for a thief or attacker.
:>
:>
:> The problem comes from how EFS works when the encryption
:> is done. When a user marks a file for encryption a
:> backup-file, called efs0.tmp, will be created. When
:> the copy is in place the orginal file will be deleted
:> and then recreated, now encrypted, from the efs0.tmp-
:> file.
:> And finally, when the new encrypted file is succesfully
:> created, the temporary-file ( which will never be shown
:> in the user interface ) will be deleted as well.
:>
:> So far, so good. The only file remaining is the one
:> which is encrypted.
:>
:>
:> But the flaw is this: the temporary-file is deleted
:> in the same way any other file is "deleted" - i.e.
:> the entry in the $mft is marked as empty and the clusters
:> where the file was stored will be marked in the $Bitmap
:> as available, but the psysical file and the information it
:> contains will NOT be deleted. The information in the
:> file which the user have encrypted will be left in the backup
:> file efs0.tmp in total plaintext on the surface of the disk.
:>
:> When new files are added to the partition will they
:> gradually overwrite the secret information, but if
:> the encrypted file was large - the information could
:> be left for months.
:>
:> So how can this be exploited ? If someone steals
:> a laptop or have psysical access to the disk it will
:> be easy to use any low level disk editor to search
:> for the information. For example, the Microsoft
:> Support Tool "dskprobe.exe" works fine for locating
:> old efs0.tmp-files and read information, in plain-text,
:> that the user thought was safe.
:>
:> In my opinion there should be a function in the EFS
:> which physically overwrites the efs0.tmp at least once
:> to make it a lot harder for an attacker to gain control
:> over secret information.
:>
:>
:>
:> Here is a description how to test this :
:>
:> Use any version of Windows 2000.
:> Install the Support Tools from the Win2000 CD.
:>
:> For demonstrating purposes - create a new partition with
:> the size of 7 MB.
:> Choose to format with NTFS.
:> Create a new small file ( easier to find ) with Notepad
:> and put some text in it. Save this file in the root of the
:> 

Cryptography-Digest Digest #556

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #556, Volume #13  Fri, 26 Jan 01 12:13:01 EST

Contents:
  Re: Windows encryption: API and file system ("Ben Newman")
  Re: Some Enigma Questions (Jim Reeds)
  Weak DES keys/Weak Plaintexts ([EMAIL PROTECTED])
  Re: Why Microsoft's Product Activation Stinks (Lord Running Clam)
  Re: Barrett modular reduction ([EMAIL PROTECTED])
  Re: Producing "bit-balanced" strings efficiently for Dynamic Transposition (John 
Savard)
  History Question: signatures in nuclear test ban verification? (Gerard Tel)
  Re: Fitting Dynamic Transposition into a Binary World (John Savard)
  Re: Dynamic Transposition Revisited (long) (John Savard)
  Re: Paranoia (JCA)
  Re: Why Microsoft's Product Activation Stinks (Richard Heathfield)
  ICCIT2001 (CFP) ([EMAIL PROTECTED])
  Re: What do you do with broken crypto hardware? (John Savard)
  Re: What do you do with broken crypto hardware? (John Savard)
  Re: Dynamic Transposition Revisited (long) ("Paul Pires")



From: "Ben Newman" <[EMAIL PROTECTED]>
Subject: Re: Windows encryption: API and file system
Date: Fri, 26 Jan 2001 14:41:34 GMT

Good point. I do think that they should at least zero out the sectors on
disk that contain the temporary file.

> Isn't it more a question of what kinds of attacks this encryption is
> supposed to defend against? Surely if the user's login record / password /
> whatever is used to encrypt the files, and no passphrase is needed for
> accessing an encrypted file, stealing the disk will give you all the
> information you need to decrypt the encrypted files anyway, yes?
>
> What kinds of attacks does Microsoft think this defends against? Theft of
> backup materials, maybe? Reading of files by administrators?
>



--

From: [EMAIL PROTECTED] (Jim Reeds)
Subject: Re: Some Enigma Questions
Date: Fri, 26 Jan 2001 14:52:52 GMT

In article <[EMAIL PROTECTED]>, "Yeah" <[EMAIL PROTECTED]> writes:


|> Didn't the British Government invent the worlds first programmable computer
|> to crak the enigma code. (Suck that America, IBM more precisely)
|> I think i once heard the lead designer on TV commenting that it too about 5
|> minutes to crack the code on their computer and that he once got the paper
|> reel spinning at 3 times the RPM of usual before it broke.

No.

You are thinking of the "Colossus", an electronic special
purpose calculator designed by Tommy Flowers of the British
Post Office labs to break a different German cipher. Colossus
used vacuum tubes and high speed (5,000 characters per
second) punched tape, but it was not programmable in the modern
sense of the word.  (One had to set switches and plug plugboards
to change the parameters of a run.)  It was definitely the
most technologically advanced instance of use of digital logic,
large-scale use of vacuum tubes, etc, at its time, but was (I
think) matched in conception by several contemporary computing
projects in America and Germany.

I suspect, but have no evidence, that the special purpose
number theoretical calculators built by D. H. Lehmer in the
1930s in California were a kind of mental jumping off point
for the Colossus team.  The team that used Colossus, and
which commissioned Flowers to design and build it,
was full of pure mathematicians, who would have known of
Lehmer's machines.
 

-- 
Jim Reeds, AT&T Labs - Research
Shannon Laboratory, Room C229, Building 103
180 Park Avenue, Florham Park, NJ 07932-0971, USA

[EMAIL PROTECTED], phone: +1 973 360 8414, fax: +1 973 360 8178

--

From: [EMAIL PROTECTED]
Subject: Weak DES keys/Weak Plaintexts
Date: Fri, 26 Jan 2001 10:01:12 -0500

I know that DES has some weak keys that make plaintext recovery easy.

Q. Are there weak DES plaintext that make key recovery easier?

Example: I control the plaintext, someone else does a single
des_ecb_encrypt(), and I receive the cyphertext.  Is there a
particularly weak plaintext I could select to be encrypted to make the
unknown key be recovered eaiser?

Thanks for the help.

Please Reply or CC' me if possible, since I have limited newsgroup
access.

 - Aaron
==
Disclaimer:
The views and opinions are soley mine and not my companies.


--

Date: Fri, 26 Jan 2001 09:25:33 -0600
From: Lord Running Clam 
Subject: Re: Why Microsoft's Product Activation Stinks
Crossposted-To: or.politics,talk.politics.crypto,misc.survivalism

=BEGIN PGP SIGNED MESSAGE=

On Fri, 26 Jan 2001, Richard Heathfield <[EMAIL PROTECTED]> wrote:
>Anthony Stephen Szopa wrote:
>> 
>> Pointless program where to stop software piracy could increase
>> revenues by tens of billions of dollars each year?  Pointless?
>
>Pretty much, yes. It's like trying to protect Pythagoras' Theorem.
>Counter-productive.

Excuse me, but is this little piece from alt.security.pgp relevant to your
flamewar?

http://www.deja.com/[ST_rn=ps]/getdoc.xp?AN=720256016&fmt

Cryptography-Digest Digest #555

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #555, Volume #13  Fri, 26 Jan 01 09:13:01 EST

Contents:
  Re: William's P+1 (Bob Silverman)
  Re: Dynamic Transposition Revisited (long) (Mok-Kong Shen)
  Re: William's P+1 ([EMAIL PROTECTED])
  Re: What do you do with broken crypto hardware? (John Veldhuis)
  Re: Dynamic Transposition Revisited (long) (Mok-Kong Shen)
  Re: What do you do with broken crypto hardware? (Paul Rubin)
  Re: Paranoia ([EMAIL PROTECTED])
  Re: Cryptographic Camouflage (Mok-Kong Shen)
  Re: Dynamic Transposition Revisited (long) (Rob Warnock)
  Re: Fitting Dynamic Transposition into a Binary World (Rob Warnock)
  Re: What do you do with broken crypto hardware? (John Veldhuis)
  Re: Why Microsoft's Product Activation Stinks (Richard Heathfield)
  Re: Producing "bit-balanced" strings efficiently for Dynamic Transposition (Rob 
Warnock)



From: Bob Silverman <[EMAIL PROTECTED]>
Subject: Re: William's P+1
Date: Fri, 26 Jan 2001 12:39:25 GMT

In article <94n6eq$lhj$[EMAIL PROTECTED]>,
  "The Death" <[EMAIL PROTECTED]> wrote:
> I saw several websites, and they all mentioned this algorithm but
didn't
> have any info about it. Can any1 give me information about this
algorithm?


It finds a factor p dividing n  if p+1 only has small prime
factors.

It only works 1/2 the time even when p has the required property.
(you choose a Lucas sequence.  It succeeeds iff the discriminant is a
non-residue mod p)

It is obsolete.

What more would you like?

--
Bob Silverman
"You can lead a horse's ass to knowledge, but you can't make him think"


Sent via Deja.com
http://www.deja.com/

--

From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Re: Dynamic Transposition Revisited (long)
Date: Fri, 26 Jan 2001 13:56:11 +0100



Mok-Kong Shen wrote:
> 
> Terry Ritter wrote:
> >
[snip]
> My knowledge is too meager to enable me to offer more
> points than I have already done. However, it is my
> impression that your arguments todate somehow (I have
> no definite idea of that) need strenthening, if DT is
> to be accepted as on a par with the theoretical OTP
> (which seems to be your goal), in particular by the
> academics, assuming DT has in fact that property.
> (Apology, if my open words are inappropriate in some
> way.)

After some re-thinking, I do like to elaborate a little
a previous point of mine concerning the question of 
perfectness of DT.

Suppose we have block size of n and we agree not to use
the non-balanced groups of bits but only the balanced
ones to transmit informations (in other words, we have
an 'alphabet' of a certain size m that is less than n). This 
serves to separate out the issue of bit balancing in order to
simpify the argumentation below.

Now what we have is the following: Given an information block, 
we do permutations of its bits to produce an enciphered block 
with the help of a PRNG. A PRNG never provides a perfect bit
sequence in the sense used in the context of the theoretical 
OTP. How can it be that this imperfectness does not manifest 
itself in some form (possibly in certain very much reduced, 
practically entirely negligible, intensity) AT ALL in our 
encryption result? Let's order all the distinct balanced bit 
groups into a sequence S and feed repetitions of S into our 
algorithm. This input is evidently perfectly predictable. Can 
the output be perfectly unpredictable? It certainly cannot. 
For the PRNG has a finite period and hence the ciphertext 
must cycle ultimately. This shows that, while DT could be 
practically very secure (an issue that certainly merits 
careful study before its being used in practice), it cannot 
offer perfect security that pertains to the theoretical OTP.

M. K. Shen
===
http://home.t-online.de/home/mok-kong.shen

--

From: [EMAIL PROTECTED]
Subject: Re: William's P+1
Date: Fri, 26 Jan 2001 12:45:54 GMT

In article <94n6eq$lhj$[EMAIL PROTECTED]>,
  "The Death" <[EMAIL PROTECTED]> wrote:
> I saw several websites, and they all mentioned this algorithm but
didn't
> have any info about it. Can any1 give me information about this
algorithm?
>
>
There's a description in "A Survey of Modern Integer Factorization
Algorithms" CWI Quarterly, v.7 (4), 1994, pp. 337 - 365, by Peter
Montgomery which is available here:
http://ftp.cwi.nl/ftp/CWIQuarterly/1994/7.4/Montgomery.ps.Z

Chris


Sent via Deja.com
http://www.deja.com/

--

From: John Veldhuis <[EMAIL PROTECTED]>
Subject: Re: What do you do with broken crypto hardware?
Date: Fri, 26 Jan 2001 13:01:33 GMT

Paul Rubin wrote:
> =

> I'm wondering if anyone else here is using crypto hardware modules for
> key management.  What do you do if one malfunctions?  Throw it into a
> blast furnace?  Send it back to the manufacturer for warranty
> repair/replacement, with your secret keys inside?

I just send it back to the manufacturer. The moment it 

Cryptography-Digest Digest #554

2001-01-26 Thread Digestifier

Cryptography-Digest Digest #554, Volume #13  Fri, 26 Jan 01 07:13:00 EST

Contents:
  Re: Why Microsoft's Product Activation Stinks (Anthony Stephen Szopa)
  Re: What do you do with broken crypto hardware? (Paul Rubin)
  Re: What do you do with broken crypto hardware? (Nicol So)
  Re: Durstenfeld Transpositions & ARC4 (Benjamin Goldberg)
  Re: Durstenfeld Transpositions & ARC4 (Mok-Kong Shen)
  Decode Algorythim ("Yeah")
  Re: Some Enigma Questions ("Yeah")
  Re: Steak Stream Cipher ([EMAIL PROTECTED])
  Re: Durstenfeld Transpositions & ARC4 (Mok-Kong Shen)
  Paranoia (Simon Jenkins)



From: Anthony Stephen Szopa <[EMAIL PROTECTED]>
Crossposted-To: or.politics,talk.politics.crypto,misc.survivalism
Subject: Re: Why Microsoft's Product Activation Stinks
Date: Fri, 26 Jan 2001 00:10:54 -0800

Splaat23 wrote:
> 
> He doesn't consider XORing two files together to be significant. That's
> easy! He considers XORing two files together, one of which happens to
> be generated by a PRNG to be significant. Innovation, what a sight! I
> wish I had his foresight to create a slow, unwieldy stream cipher that
> has no market to acquire and no use.
> 
> He was not stupid for showing it to Microsoft. He's stupid for
> believing that not a soul could think it up independently! I love his
> lack of understanding of the laws of causation: "I sent my [simple,
> bad] program [that could be thought up by any 9-year old reading _AC_]
> to Microsoft, and years later they come out with something remotely
> similiar, therefore they are liars and thieves!"
> 
> Note, I think Microsoft's patenting of this, if that's what they really
> intend to do, is silly, like most tech patents, but that's OT.
> 
> Enough bashing of Mr. Szopa. From his past posting history (which I had
> the urge to view and regret my stupidity), Mr. Szopa will disregard
> anything we say here and continue to believe his own superiority over
> us mere mortals.
> 
> - Andrew
> 
> In article <[EMAIL PROTECTED]>,
>   Richard Heathfield <[EMAIL PROTECTED]> wrote:
> > [Sorry to reply to Joe's post when I'm really addressing the issues
> > raised by Mr Szopa. Mr Szopa's article hasn't hit my newsfeed yet and
> > may not do so for some time...]
> >
> > > "Anthony Stephen Szopa" <[EMAIL PROTECTED]> wrote in message
> > > news:[EMAIL PROTECTED]...
> > > > Richard Heathfield wrote:
> > > > >
> > > > > Anthony Stephen Szopa wrote:
> > > > > >
> > > > > 
> > > > > >
> > > > > > So that's all I have to say for a while.
> > > > >
> > > > > Is that a promise?
> > > >
> > > >
> > > > Here is a guy who spits on the souls of anyone for no damned
> reason.
> >
> > I guess it wasn't a promise after all. (sigh)
> >
> > > >
> > > > I told you that I am the inventor that will save people tens or
> > > > hundreds of billions of dollars in lost revenue and you verbally
> > > > shit on me with your sarcasm.
> >
> > You do a good line in invective. Perhaps you should switch from crypto
> > to politics.
> >
> > > > Did you develope an anti-piracy computer software module that will
> > > > prevent perhaps half at a minimum of the illegal copying of
> > > > computer software in the world?
> >
> > Certainly not. I wouldn't dream of writing such a pointless program.
> >
> > > >  Do you know how important a contribution this is?
> >
> > It's completely insignificant to those who have already realised that
> MS
> > has, for years, been using the very best copy protection of all - i.e.
> > products that don't work, products that corrupt files, products that
> > hang the machine... Why would anyone with the slightest semblance of
> > common sense *want* to copy programs like that?
> >
> > > > I can prove that I did this.  And if I eventually do prove it
> > > > publicly everyone will know you are a fool.  But most importantly
> > > > you will know.  I think you probably already know you are a fool.
> >
> > If you really were conned by MS, I sympathise (like Joe), but am
> stunned
> > by your naivete.
> >
> > 1) Copy protection doesn't work. sci.crypt already knows this. Why
> don't
> > you?
> > 2) Microsoft is well-known for exploiting anything it can exploit.
> >
> > > > I am certainly one of a very very few and perhaps the only person
> in
> > > > the world who can prove that they did it before MS.
> >
> > You're the guy with the proprietary no-source-code-provided technique
> > for XORing two files together, yes? The one with the front end that
> > looks like something the cat dragged in? The one you said was so
> > innovative?
> >
> > > > I am not going
> > > > to divulge my thought processes here or my plans or my actions
> > > > regarding the implications of this situation at this time, as I
> have
> > > > said.
> >
> > Excellent.
> >
> > > > I am actively pursuing my interests.
> > > >
> > > > I think I read that there is about $50 billion dollars worth of
> > > > computer software piracy going on every year.
> >