Re: combining entropy

2008-10-27 Thread Jonathan Katz
On Sat, 25 Oct 2008, John Denker wrote: On 10/25/2008 04:40 AM, IanG gave us some additional information. Even so, it appears there is still some uncertainty as to interpretation, i.e. some uncertainty as to the requirements and objectives. I hereby propose a new scenario. It is detailed enou

Re: combining entropy

2008-10-27 Thread Dave Howe
John Denker wrote: > On 09/29/2008 05:13 AM, IanG wrote: >> My assumptions are: >> >> * I trust no single source of Random Numbers. >> * I trust at least one source of all the sources. >> * no particular difficulty with lossy combination. > > >> If I have N pools of entropy (all same size X) a

Cryptologic History Symposium: Call for Papers

2008-10-27 Thread Steven M. Bellovin
Forwarded with permission. --- From: "Sieg, Kent G" <[EMAIL PROTECTED]> Subject: Symposium Call for Papers Date: Mon, 27 Oct 2008 10:23:50 -0400 Just sending notice of our upcoming Symposium, especially if you can present or know of a colleague who would like to do so. Dr. Kent Sieg

Rubber-hose cryptanalysis?

2008-10-27 Thread Steven M. Bellovin
http://news.cnet.com/8301-13739_3-10069776-46.html?tag=mncol --Steve Bellovin, http://www.cs.columbia.edu/~smb - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED

Re: Who cares about side-channel attacks?

2008-10-27 Thread Ben Laurie
Peter Gutmann wrote: > In fact none of the people/organisations I queried about this fitted into any > of the proposed categories, it was all embedded devices, typically SCADA > systems, home automation, consumer electronics, that sort of thing, so it was > really a single category which was "Em

Cloning resistance in bluetooth

2008-10-27 Thread James A. Donald
Suppose one has a system that automatically signs you on to anything if your cell phone is within bluetooth range of your computer, and automatically signs you off out of everything, and puts up a screen saver that will not go away, when your cell phone is out of range of your computer. What

Re: data rape once more, with feeling.

2008-10-27 Thread John Gilmore
"Usability research" about how to track web users? How Google-like. Can't you just dump a 25-year cookie on them from twelve different directions, and be done with it? > Federated Login has been a "holy grail" in the identity community > for a long time. We have known how to do the technical pa

Re: combining entropy

2008-10-27 Thread Sandy Harris
John Denker <[EMAIL PROTECTED]> wrote: > To say the same thing in more detail: Suppose we start > with N generators, each of which puts out a 160 bit word > containing 80 bits of _trusted_ entropy. That's a 50% > entropy density. So you need a 2:1 or heavier compression that won't lose entropy.

Re: combining entropy

2008-10-27 Thread John Denker
Alas on 10/25/2008 01:40 PM, I wrote: > To summarize: In the special sub-case where M=1, XOR > is as good as it gets. In all other cases I can think > of, the hash approach is much better. I should have said that in the special sub-case where the member word has entropy density XX=100% _or_ i

Re: combining entropy

2008-10-27 Thread John Denker
On 10/25/2008 04:40 AM, IanG gave us some additional information. Even so, it appears there is still some uncertainty as to interpretation, i.e. some uncertainty as to the requirements and objectives. I hereby propose a new scenario. It is detailed enough to be amenable to formal analysis. The

Re: combining entropy

2008-10-27 Thread Ben Laurie
On Sat, Oct 25, 2008 at 12:40 PM, IanG <[EMAIL PROTECTED]> wrote: > Jonathan Katz wrote: >> I think it depends on what you mean by "N pools of entropy". > > > I can see that my description was a bit weak, yes. Here's a better > view, incorporating the feedback: > > If I have N people, each with