Re: Trusted timestamping

2009-10-05 Thread Fearghas McKay


On 5 Oct 2009, at 16:04, Ian G wrote:

My view is that there is no demand for this as a service.  The  
apparent need for it is more a paper requirement that came out of  
PKI world's search for a perfect product than any business need.


E.g., if you think you want it, you might be better rewarded by re- 
examining your assumptions as to why it is needed, than building it...


http://www.itconsult.co.uk/stamper.htm

Has been around since ~1995 and just works whenever I have used it,  
albeit some time ago. It publishes time stamp info on Usenet,  
comp.security.pgp.announce which shows the last activity was in 2002...


http://groups.google.com/group/comp.security.pgp.announce/browse_thread/thread/d25667d87c1740f6#

Which seems to support your viewpoint.

f

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: Trusted timestamping

2009-10-05 Thread silky
On Mon, Oct 5, 2009 at 8:42 AM, Alex Pankratov  wrote:
> Does anyone know what's the state of affairs in this area ?
>
> This is probably slightly off-topic, but I can't think of
> a better place to ask about this sort of thing.
>
> I have spent a couple of days looking around the Internet,
> and things appear to be .. erm .. hectic and disorganized.
>
> There is for example timestamp.verisign.com, but there is
> no documentation or description of it whatsoever. Even the
> website itself is broken. However it is used by Microsoft's
> code signing tool that embeds Verisign's timestamp into
> Authenticode signature of signed executable files.
>
> There is also a way to timestamp signed PDFs, but the there
> appears to be nothing _trusted_ about available Trusted
> Timestamping Authorities. Just a bunch of random companies
> that call themselves that way and provide no indication why
> they should actually be *trusted*. No audit practicies, not
> even a simple description of their backend setup. The same
> goes for the companies providing timestamping services for
> arbitrary documents, either using online interfaces or a
> downloadable software.
>
> There are also Digital Poststamps, which is a very strange
> version of a timestamping service, because their providers
> insist on NOT releasing the actual timestamp to the customer
> and then charging for each timestamp verification request.
>
> I guess my main confusion at the moment is why large CAs of
> Verisign's size not offering any standalone timestamping
> services.
>
> Any thoughts or comments ?

I have no useful comments other than to point you to a timestamping
service you may or may not have seen (I didn't see you mention it:
http://www.itconsult.co.uk/stamper/stampinf.htm), form what I've
noticed (just in passing) this seems to be the most popular stamping
service.


> Thanks,
> Alex

-- 
noon silky
  http://www.mirios.com.au/
  http://skillsforvilla.tumblr.com/

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: Question about Shamir secret sharing scheme

2009-10-05 Thread Victor Duchovni
On Sun, Oct 04, 2009 at 05:44:37PM -0600, Matt Ball wrote:

> > The question that a colleague and I have is there any cryptographic
> > purpose of computing the independent coefficients over the finite
> > field, Zp ?
> 
> Here is a concrete example of information leakage when not using Zp.
> 

When using a finite subset of a totally ordered coefficient field
(such as Q) whose "+" operator is order preserving (a < b => a + c < b + c
for all c), we always see some outputs leaking more information
than others. This covers any subsets of Z as Z is a subset of Q.

A finite subset of such a field always has a minimal element.

For example, if all the coefficients happen to be equal to the least
possible coefficient, the person with share "1" easily concludes that
he has the least possible sum, and recovers the secret coefficients.

Using infinite subsets means unbounded storage requirements for the
coefficients, and necessarily a non-uniform distribution of coefficients,
with some polynomials more probable than others, so again data leakage.

Leaking no information is only possible in a finite field, of which the
Z_p are the "simplest", but (as pointed out upthread) Galois extensions
of Z_2 are typically more convenient computationally.

-- 

 /"\ ASCII RIBBON  NOTICE: If received in error,
 \ / CAMPAIGN Victor Duchovni  please destroy and notify
  X AGAINST   IT Security, sender. Sender does not waive
 / \ HTML MAILMorgan Stanley   confidentiality or privilege,
   and use is prohibited.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: Trusted timestamping

2009-10-05 Thread Thierry Moreau

Alex Pankratov wrote:
Does anyone know what's the state of affairs in this area ? 


This is probably slightly off-topic, but I can't think of
a better place to ask about this sort of thing.

I have spent a couple of days looking around the Internet,
and things appear to be .. erm .. hectic and disorganized.

There is for example timestamp.verisign.com, but there is 
no documentation or description of it whatsoever. Even the
website itself is broken. However it is used by Microsoft's 
code signing tool that embeds Verisign's timestamp into 
Authenticode signature of signed executable files.


There is also a way to timestamp signed PDFs, but the there 
appears to be nothing _trusted_ about available Trusted 
Timestamping Authorities. Just a bunch of random companies

that call themselves that way and provide no indication why
they should actually be *trusted*. No audit practicies, not 
even a simple description of their backend setup. The same
goes for the companies providing timestamping services for 
arbitrary documents, either using online interfaces or a

downloadable software.

There are also Digital Poststamps, which is a very strange
version of a timestamping service, because their providers
insist on NOT releasing the actual timestamp to the customer 
and then charging for each timestamp verification request.


I guess my main confusion at the moment is why large CAs of 
Verisign's size not offering any standalone timestamping 
services.


Any thoughts or comments ?
  


I answer your question by two questions:

Trusted timestamping service is like a specialized form of 
non-repudiation service. You may wonder if there is any fielded usage of 
genuine non-repudiation service, i.e. extending to an arbitration 
function that would support evidence management in some litigation 
forum. Fraud prevention in payment systems is not based on a genuine 
non-repudiation scheme. Are you aware of the current state of genuine 
non-repudiation service?


Another approach to your question is that timestamping service has to be 
sold before being fielded and used. Who is(are) the real 
beneficiary(ies) in a trusted timestamping service, and how do you sell 
the service to them so that it makes economic sense?


Regards,

- Thierry Moreau
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: Question about Shamir secret sharing scheme

2009-10-05 Thread Jonathan Katz

On Sat, 3 Oct 2009, Kevin W. Wall wrote:


Hi list...I have a question about Shamir's secret sharing.

According to the _Handbook of Applied Cryptography_
Shamir’s secret sharing (t,n) threshold scheme works as follows:

   SUMMARY: a trusted party distributes shares of a secret S to n users.
   RESULT: any group of t users which pool their shares can recover S.

   The trusted party T begins with a secret integer S ≥ 0 it wishes
   to distribute among n users.
   (a) T chooses a prime p > max(S, n), and defines a0 = S.
   (b) T selects t−1 random, independent coefficients defining the random
   polynomial over Zp.
   (c) T computes Si = f(i) mod p, 1 ≤ i ≤ n (or for any n distinct
   points i, 1 ≤ i ≤ p − 1), and securely transfers the share Si
   to user Pi , along with public index i.

The secret S can then be computed by finding f(0) more or less by
using Lagrangian interpolation on the t shares, the points (i, Si).

The question that a colleague and I have is there any cryptographic
purpose of computing the independent coefficients over the finite
field, Zp ?


Just to add two comments to what others have already said:
- You can use any finite field. In particular, if your secret is a bit 
string of length k you can use the field GF(2^k) to get share size equal 
to secret size. (Whereas if you work mod p you lose a bit.)


- As you describe the scheme above, note that you actually leak an 
upper-bound on the size of the secret (namely, it is at most p). The setup 
for Shamir secret sharing (and any other scheme, for that matter) assumes 
the range of the secret is public knowledge already.

RE: Trusted timestamping

2009-10-05 Thread piers.bowness
> -Original Message-
> On Sunday, October 04, 2009 5:42 PM
> Alex Pankratov  wrote:
> 
> Does anyone know what's the state of affairs in this area ? 

I think there are two factors. 1) This is complex problem and 2) Where
it might have really been required (i.e. the courts) it has not; the
courts accept unsigned, text log files as reasonable evidence.

>From a local (as in US) perspective I would look into some of the
services provided by NIST (http://tf.nist.gov/service/its.htm). Even
their "authenticated" offerings appear to be very limited, and use
static, symmetric keys (which can only be obtained by snail-mail!)

I've always liked the saying: "A man with two watches never knows what
time it is."  As long as there is more than one accepted internet time
source and the courts accept uncertified timestamps in log files, I
don't see any clear solution to (or reason to pursue) obtaining "signed
time".


-Piers
--
Piers Bowness
RSA - The Security Division of EMC

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: Trusted timestamping

2009-10-05 Thread Ian G

On 04/10/2009 23:42, Alex Pankratov wrote:


I guess my main confusion at the moment is why large CAs of
Verisign's size not offering any standalone timestamping
services.



My view is that there is no demand for this as a service.  The apparent 
need for it is more a paper requirement that came out of PKI world's 
search for a perfect product than any business need.


E.g., if you think you want it, you might be better rewarded by 
re-examining your assumptions as to why it is needed, than building it...



iang

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: Trusted timestamping

2009-10-05 Thread Paweł Krawczyk
On Sun, 04 Oct 2009 23:42:22 +0200 Alex Pankratov  
wrote:

>There is for example timestamp.verisign.com, but there is 
>no documentation or description of it whatsoever. 

>From European world plagued with qualified electronic signature 
disease - timestamp servers usually are compatible with RFC 3161 
"Time-Stamp Protocol (TSP)" that works over HTTP, but since they 
don't want to provide free timestamping for anyone they're using 
various techniques to limit usage of this service.

I've seen two techniques to do this. One was allowing only TSP 
request encapsulated in *signed* CMS (RFC 3369). So if you're 
signing a document using qualified signature AND timestamp you've 
got to enter PIN twice - one for document signature, one for TSP 
transport signature. 

The other server was not requiring signed CMS, but instead silently 
discarded signature requests from clients other that their own 
software. It had something to do with TSP options probably, but I 
didn't investigate any deeper.

-- 
Pawe  Krawczyk
http://ipsec.pl

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


BusinessWeek article on IBM Research's Fully Homomorphic Encryption

2009-10-05 Thread Ali, Saqib
Good read:
http://www.businessweek.com/technology/content/sep2009/tc20090930_463595.htm

For more info:
http://www-03.ibm.com/press/us/en/pressrelease/27840.wss
http://portal.acm.org/citation.cfm?id=1536414.1536440

This is just a proof of possibility, not (yet) feasibility.


saqib
http://enterprise20.squarespace.com

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: New Technology to Make Digital Data Disappear, on Purpose

2009-10-05 Thread Ali, Saqib
a good article about the technology and its implications:
http://www.physorg.com/news173556803.html

[Moderator's note: old news (we already had announcements on Vanish here
weeks ago), but in the last few days Ed Felten announced attacks on
Vanish:
http://www.freedom-to-tinker.com/blog/felten/breaking-vanish-story-security-research-action
so I thought I'd let this through as a way of mentioning that... --Perry]

saqib
http://replaycall.com

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Trusted timestamping

2009-10-05 Thread Alex Pankratov
Does anyone know what's the state of affairs in this area ? 

This is probably slightly off-topic, but I can't think of
a better place to ask about this sort of thing.

I have spent a couple of days looking around the Internet,
and things appear to be .. erm .. hectic and disorganized.

There is for example timestamp.verisign.com, but there is 
no documentation or description of it whatsoever. Even the
website itself is broken. However it is used by Microsoft's 
code signing tool that embeds Verisign's timestamp into 
Authenticode signature of signed executable files.

There is also a way to timestamp signed PDFs, but the there 
appears to be nothing _trusted_ about available Trusted 
Timestamping Authorities. Just a bunch of random companies
that call themselves that way and provide no indication why
they should actually be *trusted*. No audit practicies, not 
even a simple description of their backend setup. The same
goes for the companies providing timestamping services for 
arbitrary documents, either using online interfaces or a
downloadable software.

There are also Digital Poststamps, which is a very strange
version of a timestamping service, because their providers
insist on NOT releasing the actual timestamp to the customer 
and then charging for each timestamp verification request.

I guess my main confusion at the moment is why large CAs of 
Verisign's size not offering any standalone timestamping 
services.

Any thoughts or comments ?

Thanks,
Alex

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: Question about Shamir secret sharing scheme

2009-10-05 Thread Matt Ball
On Sat, Oct 3, 2009 at 12:42 AM, Kevin W. Wall  wrote:
>
> The question that a colleague and I have is there any cryptographic
> purpose of computing the independent coefficients over the finite
> field, Zp ?

Here is a concrete example of information leakage when not using Zp.

Assume that the secret and each additional coefficient is a positive
integer less than 3 (intentionally picking a very small range to keep
the math simple).  Assume there are two shares and that both shares
are needed to recover the secret.  a0 = the secret and a1 is randomly
chosen in the same range.

q(x) = a0 + a1*x

We can make a table of all possible coefficients (a0, a1) and share
values (q(1), q(2)):

(a0, a1, q(1), q(2)) = {
  (0, 0, 0, 0)
  (0, 1, 1, 2)
  (0, 2, 2, 4)
  (1, 0, 1, 1)
  (1, 1, 2, 3)
  (1, 2, 3, 5)
  (2, 0, 2, 2)
  (2, 1, 3, 4)
  (2, 2, 4, 6)
 }

>From this table, it is possible to deduce a0 (the secret) knowing only
q(2), assuming that q(2) is not 4 or 2.  Even then, you know that the
secret is not odd.  Knowing only q(1) leaks a little less information,
but you can still fully determine the secret if q(1) = 0 or 4, and
partially determine the secret if q(1) is 1 or 3.

Intuitively, the information leakage occurs because the range of q(x)
is larger than the range of the secret a0.

Conversely, when using the set of integers mod 3, the table looks like this:

(a0, a1, q(1) mod 3, q(2) mod 3) = {
  (0, 0, 0, 0)
  (0, 1, 1, 2)
  (0, 2, 2, 1)
  (1, 0, 1, 1)
  (1, 1, 2, 0)
  (1, 2, 0, 2)
  (2, 0, 2, 2)
  (2, 1, 0, 1)
  (2, 2, 1, 0)
 }

It's easy to confirm by visual inspection that knowledge of q(1) or
q(2) alone does not reveal any information about the secret a0.

>
>  The only reason that we can see to doing this is to
> keep the sizes of the shares Si bounded within some reasonable range
> and it seems as though one could just do something like allowing T
> choose random coefficients from a sufficient # of bytes and just
> do all the calculations without the 'mod p' stuff.

In any real implementation, you'd want to use a binary finite field,
such as GF(2^8) or GF(2^16).  This is way faster than using a
non-binary finite field.  The 'mod p' stuff would be optimized into a
series of fast table lookups.

For example, if you want to generate shares for a 512-bit ECC Key, you
would first divide it into 64 bytes (each of which fits inside
GF(2^8)), and then compute 64 independent shares.  Each multiply would
be a couple table look-ups and your done.

Conversely, If you were using a non-binary finite field, your best bet
is probably using 2^521-1 (a.k.a., P-521 or the 13th Mersenne prime).
However, this is way slower than 64 GF(2^8) operations because the
time required to multiply two large integers grows with the square of
the size n.  (Technically you can do it in n log n operations by using
Fourier Transforms, but this is only useful with really big integers
and you have to watch for rounding errors).  The modulo computation
with P-521 would just be a couple BIGNUM subtractions.

Even worse, if you used the set of integers (Z), the evaluated points
on the polynomial would require about d*64 bytes of storage, where d
is the degree of your polynomial (i.e., the threshold number of shares
needed to recover the secret).  The time required to do all these
multiples would roughly grow quadratically with the threshold (or
rather n log n because at this point, using Fourier transforms starts
to become appealing).

This is all moot, though, because using Z is not secure.

>
> We thought perhaps
> Shamir did the calculations of Zp because things like Java's BigInteger
> or BigDecimal weren't widely available when came up with this
> scheme back in 1979.
>
Even today, I don't see why anyone would use BigInteger or BigDecimal
for Shamir's Secret Sharing.  As I mentioned above, the time required
for a BigInteger operation grows faster than linearly with the size of
the secret (either n log n or n^2), as opposed to linear growth with a
binary field.

You might argue that BigInteger and BigDecimal are 'easy to use', but
when considering the substantially slower execution time and the extra
burden of dealing with very large shares, it's really not a net
savings.  Besides, there are many useful implementations of Shamir
Secret sharing that you could import into Java with much less work
required than reimplementing the algorithm from scratch.

Cheers,
-Matt

Matt Ball, Chair, IEEE P1619 Security in Storage Working Group
Staff Engineer, Sun Microsystems, Inc.
500 Eldorado Blvd, Bldg #5 BRM05-212, Broomfield, CO 80021
Work: 303-272-7580, Cell: 303-717-2717

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com