Cryptography-Digest Digest #537

2001-06-06 Thread Digestifier

Cryptography-Digest Digest #537, Volume #14   Wed, 6 Jun 01 17:13:01 EDT

Contents:
  Re: Best, Strongest Algorithm (gone from any reasonable topic) (Mok-Kong Shen)
  Re: AES question (Tom McCune)
  Re: Best, Strongest Algorithm (gone from any reasonable topic) (Mok-Kong Shen)
  Re: Best, Strongest Algorithm (gone from any reasonable topic) (Tim Tyler)
  Re: Best, Strongest Algorithm (gone from any reasonable topic) (Mok-Kong Shen)
  Re: AES question (Joseph Ashwood)
  Re: AES question (Mok-Kong Shen)
  Re: Def'n of bijection ([EMAIL PROTECTED])
  Re: Def'n of bijection (Mok-Kong Shen)
  Re: Def'n of bijection ([EMAIL PROTECTED])
  Re: And the FBI, too (Re: National Security Nightmare?) (Matthew Montchalin)
  Re: Def'n of bijection (Tim Tyler)
  Re: Best, Strongest Algorithm (gone from any reasonable topic) (Tim Tyler)
  Re: Def'n of bijection (John Myre)
  Re: Best, Strongest Algorithm (gone from any reasonable topic) (Tim Tyler)
  Re: Best, Strongest Algorithm (gone from any reasonable topic) (Tim Tyler)
  Re: Def'n of bijection ([EMAIL PROTECTED])
  Re: Def'n of bijection (SCOTT19U.ZIP_GUY)
  Re: Best, Strongest Algorithm (gone from any reasonable topic) 
([EMAIL PROTECTED])
  Re: RSA's new Factoring Challenges: $200,000 prize. (my be repeat) (Michael Brown)



From: Mok-Kong Shen [EMAIL PROTECTED]
Subject: Re: Best, Strongest Algorithm (gone from any reasonable topic)
Date: Wed, 06 Jun 2001 20:25:50 +0200



Tim Tyler wrote:
 
 Mok-Kong Shen [EMAIL PROTECTED] wrote:
 : Tim Tyler wrote:
 : Mok-Kong Shen [EMAIL PROTECTED] wrote:
 
 : : You probably question whether such usage leads to
 : : Shannon's perfect security which, as you said, is claimed
 : : to be a property of OTP. However, I don't see where in the
 : : literature about OTP (in connection with perfect security)
 : : the length enters into the argumentation, i.e. plays a role
 : : in the proof.
 :
 : I also think that it's not mentioned.  I beleive it is common to
 : consider the domain where all plaintexts are the same length -
 : perhaps in order to get the perfect secrecy result.
 :
 : : My memory of Shannon's paper is no good, but I don't think that he
 : : considered the length of the messages.
 :
 : I don't think it was mentioned either - all the messages were the same
 : length in the system in question.
 
 : From what you said, I don't think it is valid to consider
 : that the constant length of messages underlies the
 : proof of Shannon (unless one can demonstrate the
 : contrary).
 
 Without such an assumption, there's no proof of perfect secrecy,
 because the system doesn't exhibit it.

My admittedly now poor memory of Shannon's argument is
roughly the following: Given a message of n bits. If
it is xored with a perfect random source, then each
of the possible 2^n sequences could result as ciphertext.
Hence the a-posteriori probabability of (the content)
of the message is the same as its a-priori probability.
Now this is general for 'any' n. It certainly has no
implication to the effact that, after sending a message
of a certain length, the next following message should
have the same n. Otherwise, given an OTP sequnce of
m bits (m can usually be very large), one could have
asked the question of which size (particular, fixed,
constant n) of messages one is allowed to send with
that resource in order that the perfect security 
according to Shannon could be achieved, in issue which 
seems to be apparently absurd.

M. K. Shen

--

From: Tom McCune [EMAIL PROTECTED]
Subject: Re: AES question
Date: Wed, 06 Jun 2001 18:36:39 GMT

In article 3b1e561c$[EMAIL PROTECTED], ajd [EMAIL PROTECTED] wrote:

Hi All,

I was wandering about the algorithms that were nominated for the Advanced
Encryption Standard, it seems obvious that Rijndael will be used a lot as it
is the replacement for 3DES, but what about the other finalists. Does anyone
know of any companies using TwoFish, RC6, Mars, or Serpent in products.
Would they be used in addition to or instead of the older algorithms like
IDEA, RC4, RC5 etc.

The current PGP versions (7.0.1 and above) include AES and Twofish (both 256 
bit), and also retain usage of IDEA, CAST5, and Triple DES.

Tom McCune
My PGP Page  FAQ: http://www.McCune.cc

--

From: Mok-Kong Shen [EMAIL PROTECTED]
Subject: Re: Best, Strongest Algorithm (gone from any reasonable topic)
Date: Wed, 06 Jun 2001 20:37:54 +0200



Tim Tyler wrote:
 
 Tim Tyler [EMAIL PROTECTED] wrote:
 : Mok-Kong Shen [EMAIL PROTECTED] wrote:
 
 : : From what you said, I don't think it is valid to consider
 : : that the constant length of messages underlies the
 : : proof of Shannon (unless one can demonstrate the
 : : contrary).
 
 : Without such an assumption, there's no proof of perfect secrecy,
 : because the system doesn't exhibit it.
 
 I looked up what Bruce Schneier has to say about perfect secrecy in
 A.C.
 
 He

Cryptography-Digest Digest #537

2001-01-23 Thread Digestifier

Cryptography-Digest Digest #537, Volume #13  Wed, 24 Jan 01 02:13:00 EST

Contents:
  Re: Fitting Dynamic Transposition into a Binary World (Kenneth Almquist)
  Re: TSEPRNG, a secure RNG ? (Bryan Mongeau)
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)
  Re: Dynamic Transposition Revisited (long) (Terry Ritter)



From: [EMAIL PROTECTED] (Kenneth Almquist)
Subject: Re: Fitting Dynamic Transposition into a Binary World
Date: 24 Jan 2001 05:41:18 GMT

[EMAIL PROTECTED] (John Savard) wrote:
 2^160 equals
 1461501637330902918203684832716283019655932542976

 and the number of 164-bit balanced strings is
 1454706556296192477283016662986999417820887445240

 so one way to use Dynamic Transposition on arbitrary binary sequences
 would be to have a coding for 160-bit arbitrary sequences into 164-bit
 balanced sequences.

 Some sequences of 160 bits wouldn't have an equivalent, and so would
 have to be converted to something else; either to shorter balanced
 sequences, which could also be enciphered by Dynamic Transposition, or
 to some other kind of object to be enciphered in another way.

This means that your encoding is effectively variable length.  For each
160-bit sequence, you need to transmit an indication of whether it
has been encoded as a 164-bit balanced sequence, or some other way.
This wastes communication bandwidth (though not a lot) and also
complicates the encoding because the indication cannot be transmitted
in the clear (or you leak information).  Might I suggest coding 158-bit
arbitrary sequences as 162-bit balanced sequences?
There number of 162-bit balanced sequences is
365907784099042279561985786395502921046971688680
while 2^158 is slightly less:
365375409332725729550921208179070754913983135744
This would create a fixed overhead of four additional bits for every
158-bit block, which would add a communication overhead of about 2.53%.
If you decided to use a block size of 128 bits (in order to interface
to standard 32 and 64 bit hardware more easily), adding four bits per
block amounts to a communication overhead of 3.125%, which is still
quite reasonable.

 Of course, this kind of begs the question of how to devise an
 efficient coding for arbitrary strings into balanced strings. From
 arbitrary binary strings, one could use a simple numeration of
 balanced strings...

  = 01
 0001 = 10
 0010 = 110111
 0011 = 111011
 ...
 1011 = 10
 1100 ... coded to something else

 and maybe there *might* be a simple algorithm to do this for strings
 too large to put in a table

Finding an algorithm to do this is an interesting challenge.

The arbitrary strings can be regarded as binary numbers.  We define
a mapping between balanced strings and numbers by listing the
balanced strings in lexical order and numbering them starting from
zero, as you have done above.

The first thing to note is that we can compute the number of balanced
strings with a given prefix relatively efficiently.  For example,
let's say that our balanced strings are 162 bits long, meaning they
contain 81 "1" bits and 81 "0" bits.  If we want to know how many
strings have the prefix "110", we count the number of zeros and ones
in the prefix.  There are two "1" bits and one "0" bits.  This means
that the remainder of the string must have 79 "1" bits and 80 "0"
bits.  The number of possibilities is (79+80)! / (79! * 80!).

This allows us to process a balanced string from left to right,
keeping track of the number of the first (or last) balanced string
beginning with the bits we have seen so far.  This minimum starts
out as zero.  As we scan the string, if the next bit is zero, then
the minimum is unchanged.  If we encounter a one, then we know that
all the balanced strings which have a zero where the string we are
scanning has a one must lexically precede the string we are scanning.
Therefore, we add the number of such strings to the minimum.

To compute the number of a balanced string, we perform the operation
described in the preceding paragraph, counting the number of "0" and
"1" bits as we go along.  When we have seen 81 of either type of bit,
then there is only one possible value for the remaining bits.  (They
must be all zeros or all ones.)  At that point there is only one
balanced string beginning with the bits we have seen so far, and
we know what the number of that balanced string is, so we are done.

To generate the balanced string corresponding to a number, we modify
the algorithm to generate bits rather than reading them.  At each
step, we first try outputting a "1" bit.  If that would make the
minimum exceed the number whose bit string we are trying to 

Cryptography-Digest Digest #537

2000-08-25 Thread Digestifier

Cryptography-Digest Digest #537, Volume #12  Fri, 25 Aug 00 17:13:01 EDT

Contents:
  Re: Bytes, octets, chars, and characters (Steve Summit)
  Re: Bytes, octets, chars, and characters (Steve Summit)
  Re: "Warn when encrypting to keys with an ADK" (commodore at gci-net dot com)
  Re: "Warn when encrypting to keys with an ADK" (commodore at gci-net dot com)
  Re: 1-time pad is not secure... ("Douglas A. Gwyn")
  Re: SHA-1 program, wrongo ! (S. T. L.)
  Re: SHA-1 program (cool!) (S. T. L.)
  Re: My unprovability madness. ("Bob May")
  Re: Steganography question (zapzing)
  Re: Test on pseudorandom number generator. ("Douglas A. Gwyn")
  Offical word from PRZ on ADK issue ("Kurt Mueller")
  Re: DES: Say it or spell it? (Newbie question) (Jim Reeds)
  Re: SHA-1 program (cool!) (S. T. L.)
  Re: Bytes, octets, chars, and characters (Kevin D. Quitt)
  Re: My unprovability madness. ("Douglas A. Gwyn")
  Re: 1-time pad is not secure... ("Tony T. Warnock")
  Re: Questions about stream cipher ([EMAIL PROTECTED])
  Re: PROMIS-software for worldwide spy network by US/Isreal (Mok-Kong Shen)
  Re: UNIX Passwords (Eric Lee Green)



From: [EMAIL PROTECTED] (Steve Summit)
Crossposted-To: comp.lang.c
Subject: Re: Bytes, octets, chars, and characters
Date: 25 Aug 2000 19:11:07 GMT

In article 8o5c1t$1jk$[EMAIL PROTECTED],
[EMAIL PROTECTED] writes:
 The most common 64 bit solution appears to be:
 char 8-bit
 short   16-bit
 int 32-bit
 long64-bit

And a dandy solution it is, too.  Four different types,
four different sizes.  Just the way it should be.

Steve Summit
[EMAIL PROTECTED]
-- 
Programming Challenge #6: Don't just fix the bug.
See http://www.eskimo.com/~scs/challenge/.

--

From: [EMAIL PROTECTED] (Steve Summit)
Crossposted-To: comp.lang.c
Subject: Re: Bytes, octets, chars, and characters
Date: 25 Aug 2000 19:18:31 GMT

Benjamin Goldberg evidently wrote:
 It's too bad that integers weren't initially called int8, int16, etc...

No, it isn't.

Steve Summit
[EMAIL PROTECTED]
-- 
Programming Challenge #6: Don't just fix the bug.
See http://www.eskimo.com/~scs/challenge/.

--

From: commodore at gci-net dot com
Crossposted-To: alt.security.pgp,comp.security.pgp.discuss
Subject: Re: "Warn when encrypting to keys with an ADK"
Date: Fri, 25 Aug 2000 19:27:43 GMT
Reply-To: commodore at gci-net dot com

In 8o5n05$kiv$[EMAIL PROTECTED] S.R. Heller wrote:
-BEGIN PGP SIGNED MESSAGE-
 What the option means is, "If I encrypt to a public
 key with an ARR, and then try to remove the ADK from the recipient's
 list [i.e., from the lower pane in the select recipients dialog],
 warn me that this might be 'violating the policy' established for the
 key with the ARR." That's a mouthful, but you can test it yourself to
 see what I mean. 

Is there a function in the PGP SDK to detect and return the value of
an ARR on a key?

I couldn't seem to locate anything appropriate in the doc set.

Thanks.


--

From: commodore at gci-net dot com
Crossposted-To: alt.security.pgp,comp.security.pgp.discuss
Subject: Re: "Warn when encrypting to keys with an ADK"
Date: Fri, 25 Aug 2000 19:45:21 GMT
Reply-To: commodore at gci-net dot com

In [EMAIL PROTECTED] commodore at gci-net dot com wrote:
In 8o5n05$kiv$[EMAIL PROTECTED] S.R. Heller wrote:
-BEGIN PGP SIGNED MESSAGE-
 What the option means is, "If I encrypt to a public
 key with an ARR, and then try to remove the ADK from the recipient's
 list [i.e., from the lower pane in the select recipients dialog],
 warn me that this might be 'violating the policy' established for the
 key with the ARR." That's a mouthful, but you can test it yourself to
 see what I mean. 

Is there a function in the PGP SDK to detect and return the value of
an ARR on a key?

I couldn't seem to locate anything appropriate in the doc set.

Thanks.

Following up to my own post, a more careful examination of the docs
show a function named PGPCountAdditionalRecipientRequests() that
seems to do what I want.



--

From: "Douglas A. Gwyn" [EMAIL PROTECTED]
Subject: Re: 1-time pad is not secure...
Date: Fri, 25 Aug 2000 18:52:33 GMT

"Tony T. Warnock" wrote:
 It's more like using a colorless jawbreakers, opening one bag, if it's red, the
 other is blue, if the first one is blue, the other is red. The experiment may be
 repeated, half the time one gets red-blue, the other half blue-red.

Well, one doesn't know what color until the observation is made,
but it's always red or blue when observed, so "

Cryptography-Digest Digest #537

1999-11-10 Thread Digestifier

Cryptography-Digest Digest #537, Volume #10  Wed, 10 Nov 99 07:13:04 EST

Contents:
  Re: Bracking RSA Encryption. Is it possible. (Tom St Denis)
  Re:  NOVA Program (Sundial Services)
  Re: Can the SETI@home client be protected? (Guy Macon)
  Re: Can the SETI@home client be protected? (Guy Macon)
  Re: Passwords - the weak link ([EMAIL PROTECTED])
  Re: Build your own one-on-one compressor (Mok-Kong Shen)
  Re: Can the SETI@home client be protected? (Volker Hetzer)
  Re: Encryption Placement ("Lassi Hippeläinen")
  Re: Signals From Intelligent Space Aliens?  Forget About It. (Gurripato)
  S/MIME plug-in for Eudora? Strong Encryption (SkinD)
  multiple valid passphrases? ("Craig Inglis")



From: Tom St Denis [EMAIL PROTECTED]
Subject: Re: Bracking RSA Encryption. Is it possible.
Date: Wed, 10 Nov 1999 05:49:33 GMT

In article 8080ps$10f$[EMAIL PROTECTED],
  [EMAIL PROTECTED] wrote:
 I have a big problem. I have a lap top sniffer on a small unix LAN and
 have managed to read packages. The packages are in RSA Encryption. I
 have timed the time it takes to encrypted the e mials. To try to get
an
 idea as what the private key is . Brute force attacks on the code off
 line are impossible to brake. Have come to the conclusion that RSA
 encryption is unbrakable and it is a waiste of time using sniffer as I
 cannot brake encryption. Putting the crimminality of it asside the
 question is can RSA code be broken. I do not think it can and is good
 security against sniffer attacks.
  KM jr what you think.

First, like the egg, you can break it by hand if you hold it properly.
[my cool saying I just thought of, and I am proud of it.]

Second, his name is Kevin Mitnick not Kelvin.

Tom


Sent via Deja.com http://www.deja.com/
Before you buy.

--

Date: Tue, 09 Nov 1999 23:08:16 -0700
From: Sundial Services [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
Subject: Re:  NOVA Program

Certainly a nicely produced program, lavishly produced in fact.  It was
quite a nice touch how they had actors precisely re-creating the motions
leading up to the historical photographs.  (The fact that so many of the
scenes were intentionally blurred and sepia-toned got a bit tedious
after a while.)

It is interesting to see how the later stories of the Bletchley Park
saga are bringing out more and more of the human side, both British and
German, of what it was like to be there.  The story of the blood-stained
intercept was absolutely stunning in its bluntness.

It was exceptionally interesting to see the interview with the radioman
of the U-150.  They seemed to want to be sure you understood, and HE
certainly wanted you to understand, that he did not abandon his duty
when ordered by his captain to "abandon the papers and get out."  As
usual, the story of German codebreaking (B-Dienst) still remains untold.

All in all, it's a very nice addition to the library of videography on
the subject.  The people involved in producing it (and the web-site as
well) should be justifiably proud of their work.


Sundial Services :: Scottsdale, AZ (USA) :: (480) 946-8259
mailto:[EMAIL PROTECTED]  (PGP public key available.)
 Got Paradox/Delphi database headaches?  ChimneySweep{tm} can help, FAST!
 http://www.sundialservices.com/cs3web.htm

--

From: [EMAIL PROTECTED] (Guy Macon)
Subject: Re: Can the SETI@home client be protected?
Date: 09 Nov 1999 23:04:45 PST

In article 809rli$ogv$[EMAIL PROTECTED], 
[EMAIL PROTECTED] (David Wagner) wrote:

In article 809h4h$[EMAIL PROTECTED],
Guy Macon [EMAIL PROTECTED] wrote:
 High stats cheater protection is already in place.  The SETI@home team
 takes any result that in any way looks odd and sends it to several
 other participants in different parts of the world.  In addition,
 right now each work unit is sent out and processed an average of 2.8
 times.  This is because the horde of PCs are processing data faster
 than the Arecibo radiotelescope can generate it. 

Sounds like you're in a great position to detect cheaters, then.
Randomized cross-checking is a powerful technique.

Why don't you track reputation using long-term client identities?
New clients should be considered relatively untrusted; but if a client
has built up a good name over time and shown itself to consistently
answer correctly, you start trusting it more.

Inject a small percentage of fake positives into the data you send
out to new clients, and also send the same data to a randomly-chosen
trusted client or three (and possibly to your own, known-good local
implementations).  If the new client's answer differs from the trusted
client's answers, trash the new guy.  If the new guy consistently
detects the fake positives, you can upgrade his reputation over time.

The better the reputation of the client is, t

Cryptography-Digest Digest #537

1999-05-12 Thread Digestifier

Cryptography-Digest Digest #537, Volume #9   Wed, 12 May 99 17:13:03 EDT

Contents:
  Re: Time stamping (complete) (Helger Lipmaa)
  a source for random number generation (Patricia Gibbons)
  Re: [Q] Are all encryption algorithms based on primes? (DJohn37050)
  Re: Random permutation ([EMAIL PROTECTED])
  Re: Crypto export limits ruled unconstitutional (Jerry Coffin)
  Re: [Q] Are all encryption algorithms based on primes? (Jerry Coffin)
  Re: Newbie:  Encrypting short strings (Matthias Bruestle)
  Re: True Randomness  The Law Of Large Numbers ([EMAIL PROTECTED])
  Layered Design (John Savard)
  Re: Crypto export limits ruled unconstitutional ([EMAIL PROTECTED])
  Re: Crypto export limits ruled unconstitutional (Serge Paccalin)
  An apology to Tom St. Denis; also, Terry Ritter is not very bright 
([EMAIL PROTECTED])
  DES analysis paper (Jayant Shukla)



From: [EMAIL PROTECTED] (Helger Lipmaa)
Subject: Re: Time stamping (complete)
Date: 12 May 1999 19:16:47 GMT

Jean Marc Dieu ([EMAIL PROTECTED]) wrote:
: Of course you need a third trusted party, whose clock is the one that will
: time stamp your document. My question in fact was: can you simoutaneously
: time-stamp AND sign a document through a one-way hash function, using a TTP?

: Have a look at http://www.surety.com

The problem of connecting a digital document with an absolute time of its
creation is unsolvable by several reasons (starting from physics). All you
can do is to get some relative stamping, where any issued time certificate
is provably one-way dependent (in one or in the other direction) with every
other certificates. Haber  Stornetta pioneered this work, and it has been
continued by several working groups, including ours. (I guess this was more
an answe to another guy)

For more you probably have to reword your question... like what do you mean
by time-stamping AND signing?

and have a look at http://home.cyber.ee/helger/crypto/link/timestamp.html

Helger
http://home.cyber.ee/helger



: At 18:33 10/05/99 -0500, you wrote:
: You could sign the document with a date stamp, humm..but then a problem I
: want to know.
:
: Where can you get such a time stamp?  I mean, looking at your computer and
: it says 6:17pm then signing the message, how does the receiver KNOW it was
: signed at 6:17pm?  Are there any time stamp authorities?

--

From: Patricia Gibbons [EMAIL PROTECTED]
Crossposted-To: alt.security.pgp
Subject: a source for random number generation
Date: Wed, 12 May 1999 13:16:17 -0700
Reply-To: [EMAIL PROTECTED]

I've found some info on random number
generation at "Aware Electronics"
website, and thought this may be of
interest to readers. This is a 
radiation-decay method that outputs
either hex or ascii random text to 
a filename or to a printer:   

http://www.aw-el.com/random.htm
-- 

Patricia E. Gibbons
Acting Chief Communications Technician
City of San Jose - ITD/communications
...
My Public Key is available at: 
http://pgp5.ai.mit.edu/pks-commands.html
Key ID: 0xEDECB44F
This key is RSA, NOT Diffie-Hellman !!

--

From: [EMAIL PROTECTED] (DJohn37050)
Subject: Re: [Q] Are all encryption algorithms based on primes?
Date: 12 May 1999 19:50:47 GMT

ANSI X9.63 draft contains ECAES (Elliptic Curve Augmented Encryption Scheme),
based on work of Bellare-Rogaway and which is not based on the difficulty of
factoring, but rather based on the ECDLP.  This is a variant of ElGamal
encryption.
Don Johnson

--

Date: Wed, 12 May 1999 16:32:11 -0400
From: [EMAIL PROTECTED]
Subject: Re: Random permutation

Bryan Olson wrote:
 
 This isn't going to be threaded in the right place.  My internet
 provide doesn't get all the posts, and Dejanews hasn't worked since
 they revised it a few days ago.
 
 [EMAIL PROTECTED] wrote:
  [EMAIL PROTECTED] wrote:
 
   If efficient means we want to use the fewest calls to our
   random number generator, use the same idea as we used to generated
   a uniform choice in [0..n) given a uniform and independent bit
   source.  Suppose rand16() returns a random choice from [0..15].
  
   endRange = 1
   randInRange = 0
   while true
   while endRange  16!
   endRange = endRange * 16
   randInRange = randInRange * 16 + rand16()
   if randInRange  16!
   return randInRange
   else
   endRange = endRange - 16!
   randInRange = randInRange - 16!
  
   This returns a uniform choice from [0, 16!-1], which
   we cam map one-to-one to the possible permuations.  It's
   optimal in the expected number of calls to rand16().
 
  I question the characterization of this approach as efficient.  It
  requires use of numbers well over 32-bits in length due to the
  computation of 16 factorial.
 
 True, but be fair.  I stated exact