ANNOUNCING Allmydata.org "Tahoe", the Least-Authority Filesystem, v1.2

2008-07-21 Thread zooko
Dear people of the Cryptography mailing list: The Hack Tahoe! contest (http://hacktahoe.org ) has already led a security researchers to spot a flaw in our crypto design. This release fixes that flaw. Regards, Zooko ANNOUNCING Allmydata.org "Tahoe", the Least-Authority Filesystem, v1.2

WPost: Cybersecurity Will Take A Big Bite of the Budget

2008-07-21 Thread John Gilmore
[News report below.] This highly classified little-publicized multi-billion dollar "vague" program to secure Federal computers seems doomed to failure. People like you and I, in the unclassified private sector, design and build and program all those computers and networks. But of course we've ne

Re: Looking through a modulo operation

2008-07-21 Thread Victor Duchovni
On Mon, Jul 21, 2008 at 12:03:50PM -0400, Victor Duchovni wrote: > On Sun, Jul 20, 2008 at 04:14:33PM -0600, Matt Ball wrote: > > > >From a little bit of off-line discussion, I think I've got a restatement of > > the problem that is more suitable to those with a stronger programming > > backgroun

Re: Looking through a modulo operation

2008-07-21 Thread David Wagner
Florian Weimer writes: > I've got a function f : S -> X x S where S = (Z/2Z)**96 and > X = (Z/2Z)**32. Suppose that s_0 is fixed and (x_i, s_i) = f(s_{i-1}). > (f implements a PRNG. The s_i are subsequent internal states and the > x_i are results.) > > Now f happens to be linear. I know the valu

Re: Looking through a modulo operation

2008-07-21 Thread Victor Duchovni
On Sun, Jul 20, 2008 at 04:14:33PM -0600, Matt Ball wrote: > >From a little bit of off-line discussion, I think I've got a restatement of > the problem that is more suitable to those with a stronger programming > background than mathematical background: > > "If someone uses the __random32 fun

Misinformation: new crypto product

2008-07-21 Thread PETER SCHWEITZER
A recent press release about a new cryptographic product, "Permanent Privacy" (P.P.), mentioning my name, has led to a slew of dramatically mistaken reports. Corrections: I have never had a cryptography-related connection to Harvard. I had nothing to do with the press release. Concerning

Re: Looking through a modulo operation

2008-07-21 Thread Matt Ball
On Sun, Jul 20, 2008 at 4:50 AM, Florian Weimer wrote: > I've got a function f : S -> X x S where S = (Z/2Z)**96 and > X = (Z/2Z)**32. Suppose that s_0 is fixed and (x_i, s_i) = f(s_{i-1}). > (f implements a PRNG. The s_i are subsequent internal states and the > x_i are results.) > > Now f happe