Re: Creativity and security

2006-03-21 Thread Olle Mulmo


Unfortunately, they haven't. In Europe I get receipts with different  
crossing-out patterns almost every week.


And, with "they" I mean the builders of point-of-sale terminals: I  
don't think individual store owners are given a choice.


Though I believe I have noticed a good trend in that I get receipts  
where *all but four* digits are crossed out more and more often  
nowadays.


/Olle

On Mar 20, 2006, at 21:51, [EMAIL PROTECTED] wrote:


I was tearing up some old credit card receipts recently - after all
these years, enough vendors continue to print full CC numbers on
receipts that I'm hesitant to just toss them as is, though I doubt  
there
are many dumpster divers looking for this stuff any more - when I  
found
a great example of why you don't want people applying their  
"creativity"

to security problems, at least not without a great deal of review.

You see, most vendors these days replace all but the last 4 digits of
the CC number on a receipt with X's.  But it must be boring to do the
same as everyone else, so some bright person at one vendor(*) decided
they were going to do it differently:  They X'd out *just the last  
four

digits*.  After all, who could guess the number from the 10,000
possibilities?

Ahem.
-- Jerry

(*) It was Build-A-Bear.  The receipt was at least a year old, so for
all I know they've long since fixed this.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to  
[EMAIL PROTECTED]



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Java: Helping the world build bigger idiots

2005-09-22 Thread Olle Mulmo


On Sep 21, 2005, at 23:27, Steve Furlong wrote:


If by that you mean, "Program dumb: avoid tricky code, avoid odd
usage, stick to the basics", I agree. Save your clever tricks for
hobby code and the snippets you use to score hot chicks. Critical
code, potentially dangerous code, and professional code should be
written simply and with the idioms standard to the language.


Peter's example is "standard to the language". It's just not used much 
by those influenced by other idioms prior to learning Java.


I guess another way of saying this is: the people on this list are 
getting old. :-)


/Olle


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Bluetooth cracked further

2005-06-04 Thread Olle Mulmo


On Jun 4, 2005, at 14:12, Thomas Lakofski wrote:

Finally, the PIN length ranges from 8 to 128 bits. Most manufacturers 
use a 4 digit PIN and supply it with the device. Obviously, customers 
should demand the ability to use longer PINs.


Correction: Most manufacturers hardcode the 4-digit PIN to . It has 
been known for some time that those "gadgets" need to be paired in an 
Faradayic environment: if I recall correctly, a paper being presented 
on this at the RSA conference ~2001 or so.


The forced re-pairing vulnerability is news to me. It makes me very 
concerned about Bluetooth keyboards...


/O


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Colliding X.509 Certificates

2005-03-13 Thread Olle Mulmo
Seems to me that a CA can nullify this attack by choosing a serial 
number or RDN component (after all, a CA should vet the DN and not 
simply sign what's in the PKCS#10 request), such that the public key 
does not end up at an "appropriate" DER-encoded offset in the 
certificate. Or am I completely lost?

/Olle
On Mar 4, 2005, at 13:44, Joerg Schneider wrote:
Benne,
One could e.g. construct the to-be-signed parts of the certificates,
and get the one certificate signed by a CA. Then a valid signature for
the other certificate is obtained, while the CA has not seen proof of
possession of the private key of this second certificate.

From the paper I understand that this results in two certificates, 
which
are identical except for the public key and that the attacker knows the
private keys for both.
Do you think it would be possible to modify the attack, to get 
different
Subject DNs or SubjectAltNames under the control of the attacker? This
would scare me more.

On a different note:
In a real life scenario a CA would accept PKCS#10 requests, create the 
TBS
using parts of the requests, providing other parts like 
notBefore/notAfter
and the serialNumber, and finally sign the result. This would make the
attack more difficult, as the attacker would have to guess, what the CA
makes out of the request, including time of issuance and serialNumber.

Do you think choosing the serialNumber in a way that it cannot be 
guessed
by the attacker would be an effective way to counter collsion based
attacks on CAs?

Best regards,
Jörg

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to 
[EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


RE: Code breakers crack GSM cellphone encryption

2003-09-08 Thread Olle Mulmo

DCMA comes to mind: it could potentially make it a little harder to get
your hands on any mass market eavesdropping tool.

If you are terribly concerned about this, there are end-to-end encryption
phones on the market that are used by military and others already today.
Such systems come with a price tag though: As for me, the ordinary end
user, I just have be as careful with what I say or trust when communicating
over the phone as when I'm using email.

But that should have already been the case, had I thought things through,
and shouldn't come as a shock.

/Olle

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of David Honig
Sent: den 8 september 2003 02:18
To: R. A. Hettinga; Clippable
Cc: [EMAIL PROTECTED]
Subject: Re: Code breakers crack GSM cellphone encryption

>A copy of the research was sent to GSM authorities in order to correct the
>problem, and the method is being patented so that in future it can be used
>by the law enforcement agencies.

"Laughing my ass off."  Since when do governments care about patents? 
How would this help/harm them from exploiting it?   Not that
high-end LEOs haven't already had this capacity ---Biham et al
are only the first *open* researchers to reveal this.



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]