Cryptography-Digest Digest #230

2001-04-25 Thread Digestifier

Cryptography-Digest Digest #230, Volume #14  Wed, 25 Apr 01 12:13:01 EDT

Contents:
  Re: 1024bit RSA keys. how safe are they? (Paul Schlyter)
  Re: 1024bit RSA keys. how safe are they? (Paul Schlyter)
  Re: Censorship Threat at Information Hiding Workshop (Mark Wooding)
  hellman (Brian D Jonas)
  Re: primitive elements in GF(2^W) (Mark Wooding)
  Re: primitive elements in GF(2^W) (Tom St Denis)
  Re: hellman (Tom St Denis)
  Re: Censorship Threat at Information Hiding Workshop (Tom St Denis)
  impossible diff against RC5 (Tom St Denis)
  Re: OTP WAS BROKEN!!! (FM)
  Your input on New Encrypter is appreciated. (Frog2000)
  Re: OTP was brokenNOT! (Keill Randor)
  Re: Derived Key Generation (Peter Gutmann)
  Re: SHA PRNG (Peter Gutmann)
  Re: hellman (Michael Scott)
  Re: SHA PRNG (Tom St Denis)
  Re: hellman (Tom St Denis)
  Re: hellman (Michael Scott)
  Re: hellman (Tom St Denis)



From: [EMAIL PROTECTED] (Paul Schlyter)
Subject: Re: 1024bit RSA keys. how safe are they?
Date: 25 Apr 2001 12:51:38 +0200

In article h54F6.38511$[EMAIL PROTECTED],
Tom St Denis [EMAIL PROTECTED] wrote:
 
 Brian Hetrick [EMAIL PROTECTED] wrote in message
 news:vR3F6.31938$[EMAIL PROTECTED]...
 George T. wrote...
 Does anyone has idea how safe RSA 1024 bit keys are? Are they safe
 enough to be used for encrypting credit card information, travelling
 over the internet and or residing on servers (email) for more than
 24 hours.

 My own estimate is that the actual cost of brute forcing a 1024 bit
 RSA key is about $150,000.  See
 http://www.geocities.com/tnotary/spcx509.html and
 http://www.geocities.com/tnotary/spckeysize.html.
 
 I bet I could break a 1024-bit RSA key I make with under 15 seconds of
 work on a normal desktop computer.
 
Why would you need 15 seconds to do that?  You already know the
key, don't you?
 
Now, how much time whould you need to break a 1024-bit RSA key made
by someone else in a proper way?
 
-- 

Paul Schlyter,  Swedish Amateur Astronomer's Society (SAAF)
Grev Turegatan 40,  S-114 38 Stockholm,  SWEDEN
e-mail:  pausch at saaf dot se   orpaul.schlyter at ausys dot se
WWW: http://hotel04.ausys.se/pauschhttp://welcome.to/pausch

--

From: [EMAIL PROTECTED] (Paul Schlyter)
Subject: Re: 1024bit RSA keys. how safe are they?
Date: 25 Apr 2001 12:52:03 +0200

In article 3u4F6.31953$[EMAIL PROTECTED],
Brian Hetrick [EMAIL PROTECTED] wrote:
 
 I interpreted the question as a query on the difficulty of brute-forcing
 a 1024 bit RSA key.
 
Brute-forcing a key is trying all possible key values until you
eventually find the correct key.  But you don't brute-force RSA keys,
instead you factor the modulus of the key, and once you know the
factors it's trivial to compute the secret exponent from the public
exponent.
 
Factoring an RSA key, even with a naive factoring algorithm, is many
order of magnutudes faster than brute-forcing the key, i.e. trying
all possible key values until you find the right key.
 
Factoring an RSA key also needs no plaintext-ciphertext pair.  If you
brute-force a key, you do need a plaintext-ciphertext pair.
 
Therefore RSA keys are never brute-forced -- they're factored.
 
-- 

Paul Schlyter,  Swedish Amateur Astronomer's Society (SAAF)
Grev Turegatan 40,  S-114 38 Stockholm,  SWEDEN
e-mail:  pausch at saaf dot se   orpaul.schlyter at ausys dot se
WWW: http://hotel04.ausys.se/pauschhttp://welcome.to/pausch

--

From: [EMAIL PROTECTED] (Mark Wooding)
Subject: Re: Censorship Threat at Information Hiding Workshop
Date: 25 Apr 2001 11:57:01 GMT

Trevor L. Jackson, III [EMAIL PROTECTED] wrote:

 Of course one can take Stallman's position and deny the possibility of
 intellectual property.  It appears TStD routinely makes this mistake.

I think you're maligning both Richard Stallman and Tom St Denis.

Stallman doesn't deny the possibility of intellectual property, just its
utility.  And I think labelling this position a `mistake' is somewhat
presumptious.

-- [mdw]

--

From: Brian D Jonas [EMAIL PROTECTED]
Subject: hellman
Date: Wed, 25 Apr 2001 07:45:17 -0400



 This is concerning diffie hellman key exchanges. I've found mixed info
on what the generator G should be. The java package sets it to a certain
number by default (cannot post that number from where I am). Other places
indicate using a 2  will not compromise the security. So my question is...
Should G be anything special (size,type) ? Furthermore should K be of any
certain size
. I know less than P,not prime,random, but should the size be set to say
1/2 of P ?

Dealing with:

A=G^K mod P


Thanx group,
Brian J.




--

From: [EMAIL PROTECTED] (Mark Wooding)
Subject: Re: primitive elements

Cryptography-Digest Digest #230

2000-11-27 Thread Digestifier

Cryptography-Digest Digest #230, Volume #13  Mon, 27 Nov 00 06:13:01 EST

Contents:
  Re: hardware RNG's (David Schwartz)
  Re: collision probability with file checksums ("bubba")
  Re: Is Feistel Block Cipher With Known Key An All Or Nothing Transform? (John Savard)
  Re: Effects of successful break - a "what if"-scenario? (John Savard)
  Re: collision probability with file checksums (David Schwartz)
  Re: Effects of successful break - a "what if"-scenario? (Bill Unruh)
  Re: Data Encryption Standard ?? (Bill Unruh)
  Re: collision probability with file checksums (wtshaw)
  Re: Cyrptography Digest Archive ? ("Will Anthony")
  Re: collision probability with file checksums ("Scott Fluhrer")
  Re: Proof of posession (csbh@(THESE)datahit.com (Coridon Henshaw))
  This place Pays out great and its FUN ([EMAIL PROTECTED])
  Re: Data Encryption Standard ?? ("kihdip")
  Re: [Question] Generation of random keys (Per Claesson)
  P/w based authentication and key exchange (Per Claesson)
  Re: Effects of successful break - a "what if"-scenario? (Mok-Kong Shen)



From: David Schwartz [EMAIL PROTECTED]
Subject: Re: hardware RNG's
Date: Sun, 26 Nov 2000 16:12:50 -0800


David Schwartz wrote:
 
 Dan Oetting wrote:
 
  3. [Statistics] of, pertaining to, or characterizing
  a set of items every menber of which has an equal chance
  of occurring with a particular frequency.
 
 This is a poor description of the statistical meaning. If this were
 correct, for example, no random distribution could have a mode. Every
 statistician I've ever known has used 'random' to describe distributions
 that were had a mode and a standard deviation. Heck, even gaussian
 distributions are described as random with respect to the values of
 individual members of a set whose distribution is described as gaussian.
 
 DS

By the way, I can cite dozens of usages if you'd like, for example
http://www.wku.edu/~neal/statistics/poisson.html

In each case, a distribution is described as 'random' despite all
possible values not having equal frequency.

DS

--

From: "bubba" [EMAIL PROTECTED]
Subject: Re: collision probability with file checksums
Date: Mon, 27 Nov 2000 01:09:40 GMT

If I understand the claim of SHA-1 correctly, finding a colliding file
would take as many attempts as guessing a 160-bit number. In other
words, it could take 2^160 tests worst case, or 2^159 average. So
even the ability to make 2^150 tests would require an enormous
amount of luck in addition. The ability to make 2^80 tests would be
useful only if you had 2^80 machines working in parallel.

"Ed L Cashin" [EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]...
 Hello.  A file integrity verification product like tripwire uses
 different algorithms to compute checksums for files.  By comparing the
 checksums of a file with known state to the current file's checksums,
 it's possible to find out whether the file contents have been
 modified.

 If the system uses just one 160-bit algorithm, say SHA-1, for doing
 the checksums, then what are the chances that an intruder could make a
 malicious file that has the same checksum as the file's known-state
 checksum?

 I only have slightly old references at hand (Schneier 1996 and Menezes
 et al. 1997) for figuring out the numbers.  Using numbers from the
 latter (Applied Handbook of Cryptography, p. 337), I'm trying to
 figure out how secure it is to use SHA-1 all by itself to detect file
 modification:

 1) Attacker can do 2^80 brute-force tests
 2) 160-bit digest requires 2^160 brute-force tests
 3) Attack is infeasible by a long shot.

 ... does that hold up?

 --
 --Ed Cashin PGP public key:
   [EMAIL PROTECTED]   http://www.coe.uga.edu/~ecashin/pgp/



--

From: [EMAIL PROTECTED] (John Savard)
Subject: Re: Is Feistel Block Cipher With Known Key An All Or Nothing Transform?
Date: Mon, 27 Nov 2000 01:18:34 GMT

On Sun, 26 Nov 2000 11:47:05 -0500, Gary [EMAIL PROTECTED]
wrote, in part:

When a 'secure' Fesitel cipher is used on a block with a publicly known key 
and some of the resulting block is removed. Does the bita that have been 
removed have to be brute forced or is there a faster way?

If the Feistel block cipher really is secure, indeed there is no
relationship that can be exploited between the plaintext that lead to
ciphertexts with the same bits except for a few.

So there is not a faster way...but there is an exception.

Brute-forcing the removed bits will give you many possible plaintexts.
But how can you tell if they are correct? So you need to know
something about the plaintext, such as that it might consist of only
printable ASCII characters.

If the number of removed bits has more possibilities

Cryptography-Digest Digest #230

2000-03-01 Thread Digestifier

Cryptography-Digest Digest #230, Volume #11   Wed, 1 Mar 00 18:13:01 EST

Contents:
  Re: Crypto.Com, Inc. ([EMAIL PROTECTED])
  Re: Where's the FAQ (Matt Curtin)
  You see Vakoilia Mannerheim was not in any way connected or linked to  ("Markku J. 
Saarelainen")
  You see Vakoilia Mannerheim was not in any way connected or linked to  ("Markku J. 
Saarelainen")
  And when you read my postings since April, 1999 .. you find out one  ("Markku J. 
Saarelainen")
  And my coming out party has contrinued one year ... just following the  ("Markku J. 
Saarelainen")
  Re: On jamming interception networks (Mok-Kong Shen)
  Re: On jamming interception networks (Mok-Kong Shen)
  Re: Q: 'Linear encipherment' (Mok-Kong Shen)
  very tiny algorithm - any better than XOR? (Carl Byington)
  Far out crypto claims ([EMAIL PROTECTED])
  Re: Crypto.Com, Inc. (John Savard)
  Re: First contact, establishing password without public keys (Bill Unruh)
  Re: Crypto.Com, Inc. (Xcott Craver)
  Re: very tiny algorithm - any better than XOR? (John Myre)
  ...but what about my cipher? ([EMAIL PROTECTED])
  Re: very tiny algorithm - any better than XOR? (Terje Mathisen)
  Re: Best language for encryption?? (Paul Schlyter)
  Re: Best language for encryption?? (Paul Schlyter)
  Re: differential cryptanalysis (David A. Wagner)
  Re: Passwords secure against dictionary attacks? (Johnny Bravo)
  Re: Passwords secure against dictionary attacks? (Wally Whacker)
  Re: Crypto.Com, Inc. (Mok-Kong Shen)
  Re: On jamming interception networks (Mok-Kong Shen)



From: [EMAIL PROTECTED]
Subject: Re: Crypto.Com, Inc.
Date: Wed, 01 Mar 2000 19:59:20 GMT

In article jgfunj-010300440001@dial-
243-027.itexas.net,
  [EMAIL PROTECTED] (wtshaw) wrote:
 In article 89jcq9$5vq$[EMAIL PROTECTED], Matt Blaze [EMAIL PROTECTED] wrote:

 ... I'm worried about serious harm to my own reputation
  should people erroneously conclude that this "Crypto.Com, Inc."
  outfit has something to do with me.  In particular, the Business Wire
  press release states:
 
 "... The technology provides for absolute security on open circuits
 between two users without the use of a key. The new cryptography
 concept creates absolutely unbreakable ciphers allowing software to be
 absolutely secure for the Internet, networks, and telephone lines. ..."
 
 This seems a bit of a strong statement.  The only theory that might be
 applied there would be of quantum mechanics design, which has not proven
 practical for current needs.
 
Quantum cryptography requires the use of
keys.

  I have no idea what "the technology" is, but one of the first things that
  beginning students of cryptography learn is Shannon's proof that the
  only "absolutely unbreakable" cipher that can possibly exist for "open
  circuits" is the one-time pad, which not only requires the use of a key,
  but that the key be at least as long as the message and used only once.
 
 Shannon was functionally wrong, but lots of what he said is of great
 importance.  The error was not in what he understood, OTP, but in that it
 was too simple to say that it is the only choice. This means he did not
 know or allow for development that might solved the problem, scientific
 allowance that he should have respected.

Shannon's theory only rules out the repetition
of the key. Based on the repetitive use of 2
different sequences of quantum or classical
states, Arindam Mitra has developed a
"practical key distribution technique which is
absolutely secure both for classical and
quantum keys" ( //arXiv.org/abs/quant-ph/
9912074 )

 --
 Many are waking up to the reality of insecurity; imagine that!
 You can work against itor go back to sleep and become a victim.
 Users have the right to know if software can abuse their privacy.



Sent via Deja.com http://www.deja.com/
Before you buy.

--

From: Matt Curtin [EMAIL PROTECTED]
Subject: Re: Where's the FAQ
Date: 01 Mar 2000 15:15:26 -0500

 "Andy" == Andy  [EMAIL PROTECTED] writes:

  Andy There are umpteen million FAQs on encryption, but is there one
  Andy for sci.crypt and sci.crypt.research?

Usenet Frequently Asked Questions (FAQ) archives are available around
the Internet.  Web versions can be found at:

ftp://rtfm.mit.edu/pub/usenet-by-hierarchy/ [MIT, Canonical site, text-only]
http://www.cs.ruu.nl/cgi-bin/faqwais[Utrecht University, Netherlands]
http://www.lib.ox.ac.uk/internet/news/  [Oxford University, UK]
http://www.faqs.org/[Internet FAQ Consortium, US]

  Andy Is there a recommended readling list?

Yes, see the FAQs.

-- 
Matt Curtin [EMAIL PROTECTED] http://www.interhack.net/people/cmcurtin/

--

From: "Markku J. Saarelainen" [EMAIL PROTECTED]
Crossposted-To: 
alt.politi