Re: [cryptography] crypto mdoel based on cardiorespiratory coupling

2014-04-10 Thread Paterson, Kenny
The system is vulnerable to a simple chosen plaintext attack as soon as you extract a workable scheme from the vague description in the paper (see appendix A for the closest thing to an actual specification of an encryption scheme). It should be an embarrassment to both Phys Rev X and the Unive

Re: [cryptography] European report says many crypto protocols have problems

2013-11-04 Thread Paterson, Kenny
Peter, (Full disclosure: I was one of the external reviewers of this report.) I take your point that there is a gap between cryptography and security engineering, and I understand the gap well from first-hand experience, first from my time in industry and more recently as a consultant to industry

Re: [cryptography] Using same key for ECDSA and ECIES

2013-09-20 Thread Paterson, Kenny
us trouble. Indeed, there's even a cryptographic principle - key separation - which says "use different keys for different functions". Regards Kenny On 20/09/2013 19:35, "Dominik Schürmann" wrote: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA1 > > >On

Re: [cryptography] Using same key for ECDSA and ECIES

2013-09-20 Thread Paterson, Kenny
Hi On 20/09/2013 16:07, "Alan Braggins" wrote: >On 20/09/13 13:22, Dominik Schürmann wrote: >> I am wondering if it is okay to use the same asymmetric ECC key for >> ECDSA and ECIES. Given that the signing and encryption algorithms are >> not related like in RSA, I assume it is okay to use the

Re: [cryptography] Web Cryptography API (W3C Working Draft 8 January 2013)

2013-03-10 Thread Paterson, Kenny
On 10 Mar 2013, at 11:01, Ben Laurie wrote: > On 10 March 2013 10:58, Paterson, Kenny wrote: >> >> >> Right here: http://www.w3.org/TR/WebCryptoAPI: > > Somehow missed that. Thanks. > >> 19.1. Recommended algorithms >> >> This section i

Re: [cryptography] Web Cryptography API (W3C Working Draft 8 January 2013)

2013-03-10 Thread Paterson, Kenny
On 10 Mar 2013, at 10:51, Ben Laurie wrote: On 10 March 2013 01:25, Tony Arcieri mailto:tony.arci...@gmail.com>> wrote: On Sat, Mar 9, 2013 at 4:16 PM, Jeffrey Walton mailto:noloa...@gmail.com>> wrote: The Web Cryptography Working Group looks well organized, provides a very good roadmap, and o

Re: [cryptography] Q: CBC in SSH

2013-02-12 Thread Paterson, Kenny
Jeff, >> >> There have been attacks on SSH based on the fact that portions of the packets >> aren't authenticated, and as soon as the TLS folks stop bikeshedding and >> adopt >> encrypt-then-MAC I'm going to propose the same thing for SSH, it's such a >> no-brainer it should have been adopted ye

Re: [cryptography] Q: CBC in SSH

2013-02-12 Thread Paterson, Kenny
Hi Peter, On 11 Feb 2013, at 22:45, Peter Gutmann wrote: > Ralph Holz writes: > >> From what I can tell from our data, the most common symmetric ciphers in SSH >> are proposed by client/servers to be used in CBC mode. With SSL/TLS and >> XMLEnc, this mode has had quite some publicity in the r

Re: [cryptography] Q: CBC in SSH

2013-02-11 Thread Paterson, Kenny
Hi Ralph, CBC mode is indeed a bad choice for SSH, but for other reasons than the recent artacks on TLS. The paper you mention was published as: Albrecht, Paterson, Watson, Plaintext recovery attacks on SSH. IEEE Symposium on Security and Privacy, 2009 and explains why. CTR mode in SSH see