Cryptography-Digest Digest #738

2001-02-23 Thread Digestifier

Cryptography-Digest Digest #738, Volume #13  Fri, 23 Feb 01 14:13:00 EST

Contents:
  Re: New unbreakable code from Rabin? ("Tony T. Warnock")
  Re: New unbreakable code from Rabin? (Bill Unruh)
  á÷ôïûéîù éú ñðïîéé, îå äïòïçï!!! ("kononec")
  Re: looking for 16-bit RNG... ("Douglas A. Gwyn")
  Re: New unbreakable code from Rabin? ("Douglas A. Gwyn")
  Re: Comments on Rabin's proposal ("Douglas A. Gwyn")
  Re: The Key Vanishes: Scientist Outlines Unbreakable Code, Read it and  ("Douglas A. 
Gwyn")
  Random numbers from your sound card ([EMAIL PROTECTED])
  Re: super-stong crypto, straw man phase 2 (John Myre)
  fiat shamir (zipa)
  Open-SSH(portable) and EGD ([EMAIL PROTECTED])
  Re: New unbreakable code from Rabin? ([EMAIL PROTECTED])
  Re: Any alternatives to PGP? (Alberto)
  Re: Super strong crypto (JPeschel)
  Re: Any alternatives to PGP? ("Sam Simpson")
  Re: Random numbers from your sound card (Mok-Kong Shen)
  Re: Powers of Complex Associative Functions (Jim Steuert)



From: "Tony T. Warnock" <[EMAIL PROTECTED]>
Subject: Re: New unbreakable code from Rabin?
Date: Fri, 23 Feb 2001 10:18:30 -0700
Reply-To: [EMAIL PROTECTED]

Page 107778788373812 of "Gone With the Solar Wind"


--

From: [EMAIL PROTECTED] (Bill Unruh)
Subject: Re: New unbreakable code from Rabin?
Date: 23 Feb 2001 17:25:22 GMT

In <8Uol6.20332$[EMAIL PROTECTED]> wint <[EMAIL PROTECTED]> 
writes:

>In article <3a93968d$[EMAIL PROTECTED]>, [EMAIL PROTECTED] says...
>> John Savard <[EMAIL PROTECTED]> wrote:
>> 
>> > Obviously, any random bit stream two participants are capable of
>> > exchanging is capable of being stored by an adversary.
>> 
>> The point is that this isn't such a bit stream.
>> No one generates, transmits or exchanges this bit stream.
>> They only exchange information on how to extract a bit
>> stream from a transient, public pool of random data.

Both people need access to it. Since it is public, so does a third
person, and can record it. "Noone can record that much data" is in the
same league as "no one can factor numbers". Ie, it may well be
unbreakable in practice, but in theory  it is as breakable as any
other scheme. It sounds like an attempt at creating a one time pad from
a public source. While the pad is provably secure IF the pad is not
known, in this case the pad is a known subset of a large number of pads
(actually not that large, since the number of reliable public random
bitstreams is not that great-- remember both parties must be able to
reliably extract the same bitstream from the public source, and such
reliable bitstreams are not that common.)


--

From: "kononec" <[EMAIL PROTECTED]>
Crossposted-To: 
relcom.www.users,relcom.x,sci,soc,soc.culture,soc.culture.brazil,soc.culture.irish,soc.culture.israel,soc.culture.scottish
Subject: á÷ôïûéîù éú ñðïîéé, îå äïòïçï!!!
Date: Sat, 24 Feb 2001 02:32:20 +1000

þð "ëÏÎÏÎÅÃ" ÐÒÅÄÌÁÇÁÅÔ ËÏÎÔÒÁËÔÎÙÅ ÐÏÓÔÁ×ËÉ ËÒÕÐÎÙÍ É ÍÅÌËÉÍ ÏÐÔÏÍ Á×ÔÏÛÉÎ
ÉÚ ñÐÏÎÉÉ.
÷ ÎÁÌÉÞÉÉ ÉÍÅÀÔÓÑ Á×ÔÏÛÉÎÙ ×ÓÅÈ ÒÁÚÍÅÒÏ×, Á ÔÁËÖÅ ÌÉÔØ£ ÒÁÚÎÙÏÏÂÒÁÚÎÙÈ
×ÉÄÏ×. ôÏ×ÁÒ ×Ù ÍÏÖÅÔÅ ÐÒÉÏÂÒÅÓÔÉ ÎÁ ÓËÌÁÄÅ ÐÏ ÁÄÒÅÓÕ: ç. ÷ÌÁÄÉ×ÏÓÔÏË, ÕÌ.
äÎÅÐÒÏÐÅÔÒÏ×ÓËÁÑ 19, ÓËÌÁÄ óÅ×ÅÒÏÔÏÒÇÁ, × Ò-ÎÅ. âÁÍÁ. ôÅÌÅÆÏÎ: 8(22)
46-72-89
mail-to:[EMAIL PROTECTED]
http://www.primrek.by.ru



--

From: "Douglas A. Gwyn" <[EMAIL PROTECTED]>
Subject: Re: looking for 16-bit RNG...
Date: Fri, 23 Feb 2001 16:55:26 GMT

Rik Blok wrote:
> Does anybody know of a simple and fast 16-bit pseudo-random number
> generator I could use?  There are more constraints:  I want to use it on
> a Lego Mindstorms robot which can only handle 16-bit integers (and only
> has enough storage for 32 of them...and no support for arrays).  I was
> thinking something like a linear congruential generator but is there
> anything better?  If I do use a LCG what are some good constants to use?

Your choices are basically LCG or shift-register.  Here is a LCG
implementation; like any 16-bit PRNG it is not of crypto quality.
However, it may be enough for the LEGO MindStorms robot (which by
the way is a great toy for adults).

static unsigned Next16 = 1; /* current state (seed) */
unsigned Rand16( void ) {   /* returns "random" value 0 .. 65535 */
return Next16 = (Next16 * 15245 + 12345) & 0x;
}

--

From: "Douglas A. Gwyn" <[EMAIL PROTECTED]>
Subject: Re: New unbreakable code from Rabin?
Date: Fri, 23 Feb 2001 16:56:21 GMT

[EMAIL PROTECTED] wrote:
> I think we can agree that the "random" bit stream must come
> from a completely trusted sou

Cryptography-Digest Digest #738

2000-09-22 Thread Digestifier

Cryptography-Digest Digest #738, Volume #12  Fri, 22 Sep 00 07:13:01 EDT

Contents:
  Re: Software patents are evil. (David Rush)
  Re: Again a topic of disappearing e-mail? (Runu Knips)
  Re: t ("Trevor L. Jackson, III")
  Re: What am I missing? (Sagie)
  Re: PGP 6.5.8 source code published ([EMAIL PROTECTED])
  Re: CDMA tracking (was Re: GSM tracking) (Sagie)
  Re: Maximal security for a resources-limited microcontroller (Sagie)
  Re: Maximal security for a resources-limited microcontroller (Sagie)
  Re: Tying Up Loose Ends - Correction (Tim Tyler)
  Re: Maximal security for a resources-limited microcontroller (Paul Rubin)



From: David Rush <[EMAIL PROTECTED]>
Subject: Re: Software patents are evil.
Date: 22 Sep 2000 10:23:19 +0100

"Trevor L. Jackson, III" <[EMAIL PROTECTED]> writes:
> Bill Unruh wrote:
> > In <[EMAIL PROTECTED]> "Trevor L. Jackson, III"
> > <[EMAIL PROTECTED]> writes: 
> > Patents had has almost nothing to do with software until
> > recently. Yet, you could not say that software has suffered in the
> > US. 
> 
> Devil's advocate position.  Resolved: that the low quality of US
> software is due to the lack of an effective protection for
> intellectual property. 

Oooh. I feel the first rumblings of a paradigm shift.

> dominated by cost differences.  So a company that prices its
> software higher than the competition to cover serious development

I've been there. My first startup, back in 1985 had this problem. That
was when I concluded that the American myth of the better mousetrap
was false, and that better salesman were the ones who truly get
rewarded. u$oft has only confirmed my suspicions.

> Effective IP would restore the balance between quality and cost and
> reduce the domination of the first-to-market mentality.

Actually, you could easily extend your argument to say that the
open source movement has come about due to that first-to-market
mentality. I know for myself, that If I'm looking for high-quality
software I'll take a mature open source project any day of the week.
And I work on open source because I *can* produce good work without
having to deal with the 'first is better than best' reality of the
software marketplace.

Of course this also implies that Richard Stallman has propagated more
evil than Bill Gates...

> Conclusion: I can say that software has suffered in the US if low
> quality counts as suffering.

I am definitely feeling some rumblings in my paradigm.

david rush
-- 
Next to the right of liberty, the right of property is the most
important individual right ... and ... has contributed more to the
growth of civilization than any other institution established by the
human race.
-- Popular Government (William Howard Taft)

--

Date: Fri, 22 Sep 2000 11:30:32 +0200
From: Runu Knips <[EMAIL PROTECTED]>
Subject: Re: Again a topic of disappearing e-mail?

Mok-Kong Shen wrote:
> Email users will soon be able to erase the messages they send
> from the recipient's hard drive using software called SafeMessage
> that a company called AbsoluteFuture is releasing today.
> SafeMessage destroys messages within a certain amount of time
> after the recipient opens them, erasing all footprints on PC
> hard drives and computer servers, says AbsoluteFuture CEO Graham
> Andrews. Law enforcement officials worry that criminals and
> terrorists will use SafeMessage to conceal their communications,
> arguing that fighting crime effectively in the digital age
> requires email tracing. Meanwhile, privacy advocates applaud
> the new software. One oil executive says he uses a beta version
> of SafeMessage to prevent rivals from accessing his messages.
>http://www.usatoday.com/usatonline/2920/2662888s.htm

Pfft as if this is something noticeable. Using PGP and removing
the email by hand has the same effect, doesn't it ?

--

Date: Fri, 22 Sep 2000 05:43:19 -0400
From: "Trevor L. Jackson, III" <[EMAIL PROTECTED]>
Subject: Re: t

John Savard wrote:

> On Thu, 21 Sep 2000 16:34:39 GMT, "John R."
> <[EMAIL PROTECTED]> wrote, in part:
>
> >> But the plot is cliched. I can guess how the book begins. Something
> >> like:
>
> >> T
> >> NNT
> >> NF
> >> TOT
> >> TOF
> >> FOT
> >> TIT
> >> FIT
> >> FIF
> >> TET
> >> FEF
> >> TAT
> >> LTR
> >> LNNTR
> >> LNFR
> >> LTOTR
> >> LTOFR
> >> LFOTR
> >> LTITR
> >> LFITR
> >> LFIFR
> >> LTETR
> >> LFEFR
> >> LTATR
> >&

Cryptography-Digest Digest #738

2000-05-09 Thread Digestifier

Cryptography-Digest Digest #738, Volume #11   Tue, 9 May 00 07:13:01 EDT

Contents:
  Re: Scary Possibility: Ticklish Chips (Paul Rubin)
  high speed public key crypto ("Mehdi Sotoodeh")
  Re: Why no civilian GPS anti-spoofing? / proposal (Paul Rubin)
  Re: Scary Possibility: Ticklish Chips (Volker Hetzer)
  Extended Euclidian Algorithm In C, C++ or Java ("Lewis-Oakes")
  Prime Generation in C,C++ or Java ("Lewis-Oakes")
  Re: Extended Euclidian Algorithm In C, C++ or Java (Eric Hambuch)
  Re: Generator for ElGamal? (Eric Hambuch)
  Re: Prime Generation in C,C++ or Java (Eric Hambuch)
  Re: high speed public key crypto (Eric Hambuch)
  Re: Q: Searching for authentication protocols (=?iso-8859-1?Q?Tom=B4s?= Perlines 
Hormann)
  Re: Newbie question about primes ("JoeC")
  Re: An argument for multiple AES winners ("Simon Johnson")
  Re: An argument for multiple AES winners ("Simon Johnson")
  RSA ("Simon Johnson")
  Re: RSA (Soeren Mors)
  Re: Extended Euclidian Algorithm In C, C++ or Java ("Simon Johnson")
  F function. ("Simon Johnson")
  Re: Is this random? ("Simon Johnson")
  Re: F function. (Tom St Denis)
  Re: Is there a Commercially Available Tranposition Program ("Simon Johnson")
  Re: Is there a Commercially Available Tranposition Program (Tom St Denis)
  Re: Making Java & C Serpent code compatible? (Gisle Sælensminde)
  Re: Hardware RNG (Mok-Kong Shen)
  Re: Extended Euclidian Algorithm In C, C++ or Java (John Bailey)



From: [EMAIL PROTECTED] (Paul Rubin)
Subject: Re: Scary Possibility: Ticklish Chips
Date: 9 May 2000 07:51:17 GMT

In article <8f802p$rdc$[EMAIL PROTECTED]>, zapzing  <[EMAIL PROTECTED]> wrote:
>Here's something to keep you awake at night: What if some of the
>chips for doing DES etc. have been made "ticklish" , that is what if
>some sort of irritant, such as a dose of radiation or an electrical
>input that is out of band would prompt the chip to divulge its key.
>This could be bad if bad guys manage to steal your (otherwise tamper
>proof) encryption device. Any ideas on how to prevent this, (other
>than by just trying to make your packaging impervious to all possible
>tickles, which seems to me to be pretty hopeless) ?

That's called differential fault analysis and it's a serious problem
for smart card manufacturers.  Several papers have been written about it.

For modules with more complicated packaging than smart cards, it's easier
to protect against, though I don't think any type of hardware tamper
resistance can stop a really determined and rich attacker.

--

From: "Mehdi Sotoodeh" <[EMAIL PROTECTED]>
Subject: high speed public key crypto
Date: Tue, 09 May 2000 07:59:37 GMT

I have found a new public key crypto system that is fast, easy to implement
and requires low level of system resources.
I am looking for someone who is interested to work on this as a joint
project. I specifically need help on evaluation and publication of the
project.
Please let me know if you are interested.


Mehdi Sotoodeh.
[EMAIL PROTECTED]




--

From: [EMAIL PROTECTED] (Paul Rubin)
Crossposted-To: sci.geo.satellite-nav
Subject: Re: Why no civilian GPS anti-spoofing? / proposal
Date: 9 May 2000 08:08:32 GMT

In article ,
Mxsmanic <[EMAIL PROTECTED]> wrote:
>"Paul Rubin" <[EMAIL PROTECTED]> wrote in message
>news:8f35o6$o7i$[EMAIL PROTECTED]...
>
>> I'd like to propose that civilian signals on
>> the new carriers have public-key digital signatures,
>> signed by the satellites.
>
>Just what part would you sign, exactly?  Public-key encryption is not
>appropriate for every application.

Dunno.  I leave that to GPS experts.  I do see some of the obvious
obstacles but maybe not all of them.  I have some ideas for getting
around the obstacles but they're probably naive.

>Since mission-critical navigation applications would supplement the
>satellite signals with a ground-based signal, spoofing of both would be
>no more likely than spoofing of VOR or ILS signals today, even without
>encryption.  In fact, I don't remember terrorists ever spoofing any kind
>of navigation signal at all--have I missed something?

I know one thing, which is that the US military considers spoofing a
serious enough threat to PPS that the P-code encryption system is
called "anti-spoofing" rather than "encryption".  That by itself makes
me feel that the civilian signal should also be authenticated, unless
there's a really strong reason not to do so.  

--

From: Volker Hetzer <[EMAIL PROTECTED]>
Subject: Re: Scary Possibility: Ticklish Chips
Date: Tue, 09

Cryptography-Digest Digest #738

1999-12-14 Thread Digestifier

Cryptography-Digest Digest #738, Volume #10  Tue, 14 Dec 99 13:13:01 EST

Contents:
  Re: Better encryption? PGP or Blowfish? (Tom St Denis)
  Re: Better encryption? PGP or Blowfish? (Tom St Denis)
  Re: Better encryption? PGP or Blowfish? (Tom St Denis)
  Re: Simple newbie crypto algorithmn (Eric Hambuch)
  Re: The Cracking of SecurityPlus! 4.32 (JPeschel)
  Re: The Code Book (Paul Schlyter)
  Re: Synchronised random number generation for one-time pads (Richard Herring)
  "The Cracking of Security Plus" completed  (JPeschel)
  Re: Deciphering without knowing the algorithm? (SCOTT19U.ZIP_GUY)
  Re: Why no 3des for AES candidacy (Eric Lee Green)
  Re: Deciphering without knowing the algorithm? (SCOTT19U.ZIP_GUY)
  how easy would this encryption be to crack? (Christoffer =?iso-8859-1?Q?Lern=F6?=)
  How to implement different modes using the twofish algorithm? (Martin Bädeker)
  Re: NSA should do a cryptoanalysis of AES (Derek Bell)
  Re: NSA should do a cryptoanalysis of AES (Derek Bell)
  Looking for a DES implementation in JavaScript or VBScript ([EMAIL PROTECTED])
  Re: Are thermal diodes as RNG's secure (Tim Tyler)
  Re: Data Encryption in Applet? (Tim Tyler)
  Re: how easy would this encryption be to crack? (Jerry Coffin)
  Re: Deciphering without knowing the algorithm? (Tim Tyler)
  Re: Deciphering without knowing the algorithm? (albert)



From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: Better encryption? PGP or Blowfish?
Date: Tue, 14 Dec 1999 12:58:55 GMT

In article <8345je$4v8$[EMAIL PROTECTED]>,
  Phillip George Geiger <[EMAIL PROTECTED]> wrote:
> Tom St Denis <[EMAIL PROTECTED]> wrote:
> : I was just being honest.  People never think twice before launching
a
> : flame war when I am wrong.  I know two wrongs don't make a right,
but
> : what other response could i give?
>
> You could have briefly explained why his question was a bad one, and
> pointed him at a FAQ.
>
> : His ignorant comparaison was just plain silly.
>
> And in the time it took you to think up that "witty" response, giggle
> like the child you are, and hit "enter" - you could have posted
something
> far more interesting and useful to a newbie.

But that's the thing, no one in sci.crypt cares about any real
scientific discussion, it's just a flame war waiting to happend.

Tom


Sent via Deja.com http://www.deja.com/
Before you buy.

--

From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: Better encryption? PGP or Blowfish?
Date: Tue, 14 Dec 1999 13:04:07 GMT

In article <[EMAIL PROTECTED]>,
  "Trevor Jackson, III" <[EMAIL PROTECTED]> wrote:
>
> Not always.  Depends on the message space.
>
> Consider the reponse to a proposed contract.  It can be encoded in a
bit.
> Any boolean message has this property.  Some messages have even less
> information.
>
> Consider the case of a "Go!" command.  The message itself contains
zero
> information.  The recipient is waiting for exactly this message and no
> other.  So the message consists of zero bits of plaintext plus
whatever
> authentication is necessary.
>
> Now consider the data rate of a channel used to transmit the Go!
message.
> Normally it has no data flowing through it, but there's a tacit
streams of
> "Not Yet!" messages that match the sampling rate of the receiver.
This data
> stream has no bits in it at all.  Perhaps it has a stream of noise to
> reassure the receiver that a mesage hasn't been missed.  But there's
no
> information in the noise.  It's just noise.
>
> Tough to crack such virtual messages.

Ok true, I would not attack a message with 'Go!' in it.  I would attack
the messages that described what they should go do.

Tom


Sent via Deja.com http://www.deja.com/
Before you buy.

--

From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: Better encryption? PGP or Blowfish?
Date: Tue, 14 Dec 1999 13:02:23 GMT

In article <8348is$2g18$[EMAIL PROTECTED]>,
  [EMAIL PROTECTED] (SCOTT19U.ZIP_GUY) wrote:
>This just shows how fucking stupid you are little boy pain
> in the ass. Try reading what a ZERO Iinformation system is
> sometimes instead of opening your mouth. In a ZERO information
> protocall the seeds are in there to solve any encryption including
> that of a random file. IF you think mine has enough information
> for a random file break your not only full of shit but you know
> nothing about encryption.  Try to learn something Tom becasue
> your posts are gettting dumber and dumber and it is getting
> frustracting wasting my time to try to improve your pee brain.

I will just go out invent this new attack called brute force.  I will
win a nobel. 

Cryptography-Digest Digest #738

1999-06-19 Thread Digestifier

Cryptography-Digest Digest #738, Volume #9   Sat, 19 Jun 99 09:13:02 EDT

Contents:
  [SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1 (Shannon Appel)



From: Shannon Appel <[EMAIL PROTECTED]>
Crossposted-To: 
alt.security,comp.security.misc,comp.protocols,comp.infosystems.www.misc,alt.answers,comp.answers,news.answers,sci.answers
Subject: [SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1
Date: 19 Jun 1999 12:22:31 GMT

Content-type: text/x-usenet-FAQ;
version=1.1;
title="[SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1"
Archive-name: computer-security/ssl-talk-faq
Posting-Frequency: monthly
Last-modified: Nov 16 12:00:00 PST 1998
Version: 1.1.1 (text) Mon Nov 16 12:00:00 PST 1998
URL: http://www.consensus.com/security/ssl-talk-faq.html
Copyright-Notice: (c) Copyright 1996-1998 by Consensus Development Corporation -- All 
Rights Reserved


  SSL-Talk FAQ
Secure Sockets Layer Discussion List FAQ v1.1.1

  Mon Nov 16 12:00:00 PST 1998

   FAQ Maintained by:
  Shannon Appel <[EMAIL PROTECTED]>
Consensus Development Corporation
<http://www.consensus.com/>

 The latest edition of this FAQ can always be found at:
  <http://www.consensus.com/security/ssl-talk-faq.html>
   <http://www.consensus.com/security/ssl-talk-faq.txt>

  Copyright (c) 1996-1998 Consensus Development Corporation - All Rights 
  Reserved

* 
Due to the November 15, 1998 dissolution of the SSL-Talk mailing 
list, this will be the last version of this FAQ in its current form. 
It will be replaced by a more general TLS & SSL FAQ in the near 
future that is not tied to any mailing list or newsgroup. 
*

All information contained in this work is provided "as is." All
warranties, expressed, implied or statutory, concerning the accuracy
of the information of the suitability for any particular use are
hereby specifically disclaimed. While every effort has been taken to
ensure the accuracy of the information contained in this work,
the authors assume(s) no responsibility for errors or omissions or
for damages resulting from the use of the information contained
herein.

This work may be copied in any printed or electronic form for
non-commercial, personal, or educational purposes if the work is not
modified in any way, provided that the copyright notice, the notices 
of any other author included in this work, and this copyright 
agreement appear on all copies.

Consensus Development Corporation also grants permission to
distribute this work in electronic form over computer networks for
other purposes, provided that, in addition to the terms and
restrictions set forth above, Consensus Development Corporation
and/or other cited authors are notified and that no fees are charged
for access to the information in excess of normal online charges
that are required for such distribution.

This work may also be mentioned, cited, referred to or described
(but not copied or distributed, except as authorized above) in
printed publications, on-line services, other electronic
communications media, and otherwise, provided that Consensus
Development Corporation and any other cited author receives
appropriate attribution.

Comments about, suggestions about, or corrections to this document
are welcomed. If you would like to ask us to change this document
in some way, the method we appreciate most is for you to actually
make the desired modifications to a copy of the posting, and then to
send us the modified document, or a context diff between the posted
version and your modified version (if you do the latter, make sure
to include in your mail the "Version:" line from the posted
version). Submitting changes in this way makes dealing with them
easier for us and helps to avoid misunderstandings about what you
are suggesting.

Many people have in the past provided feedback and corrections; we
thank them for their input.

In particular, many thanks to:

Christopher Allen <[EMAIL PROTECTED]>
Shannon Appel <[EMAIL PROTECTED]>
Nelson Bolyard <[EMAIL PROTECTED]>
Tim Dierks <[EMAIL PROTECTED]>
Eric Greenberg <[EMAIL PROTECTED]>
Charles Neerdaels <[EMAIL PROTECTED]>
Bruce Schneier <[EMAIL PROTECTED]>
Tom Weinstein <[EMAIL PROTECTED]>
Jonathan Zamic