Re: Wikileaks video "crypto".

2010-04-09 Thread Thomas Coppi
On Fri, Apr 9, 2010 at 13:06, Perry E. Metzger  wrote:

> The video was apparently intentionally given to Wikileaks, so one can't
> imagine that the releasing parties would have wanted it to be unreadable
> by them (or that any reasonable modern cryptosystem would have be
> crackable). What, then, does the "decryption" claim mean here. Does
> anyone know? 
>

This site http://leaks.telecomix.org/ claims to have the original,
unencrypted video. It appears to have been encrypted with OpenSSL given the
Salted__ prefix.

-- 
Thomas Coppi
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: [tahoe-dev] SHA-1 broken!

2009-05-04 Thread Thomas Coppi
On Sun, May 3, 2009 at 4:35 PM, Christian Rechberger
 wrote:
> The design of DES facilitates this kind of throughput/cost gains on FPGAs.
>
> Remember that the MD4 family (incl. SHA-1) was designed to be efficient on
> 32-bit CPUs. For these hash functions, it is much harder to get a
> throughput/cost gain on FPGAs compared to off-the-shelf CPUs. At least, this
> was my conclusion when I quickly looked into this a few years ago.
>

The n...@home project(http://nsa.unaligned.org/) seems to do it pretty well.
He even provides the optimized SHA-1 and MD5 Verilog code used.  This only works
because straight-up bruteforce requires little memory, though. If the new
SHA-1 break requires significant memory usage I don't think something
like the COPACOBANA can help.

Regards,
-- 
Thomas Coppi

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: Proof of Work -> atmospheric carbon

2009-01-30 Thread Thomas Coppi
On Wed, Jan 28, 2009 at 2:19 PM, John Levine  wrote:
> Indeed.  And don't forget that through the magic of botnets, the bad
> guys have vastly more compute power available than the good guys.

 Just out of curiosity, does anyone happen to know of any documented
examples of a botnet being used for something more interesting than
just sending spam or DDoS?

-- 
Thomas Coppi

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com