Re: [cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics

2016-09-15 Thread Thierry Moreau
t be addressed now ( P(Y) unknown as t=0! ). That's my usual list of questions. They may or may not apply to your situation. Thanks for sharing this. - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

[cryptography] True RNG: elementary particle noise sensed with surprisingly simple electronics

2016-09-15 Thread Thierry Moreau
current noise source: - thermal noise - excess current noise caused by the above resistor material construction Noise sources to be reduced (as a matter of sampling approach coherency) - electrostatic ... - electromagnetic ... Any thoughts? Regard

[cryptography] Why TLS? Why not modern authenticated D-H exchange?

2016-09-06 Thread Thierry Moreau
important lessons, as a straightforward solution path for a basic and recurring issue in IT security. Yet, the difficult aspects of applied cryptography remain difficult, the document being explicit about them. Thus, why TLS? - Thierry Moreau ___ cr

Re: [cryptography] [Cryptography] Show Crypto: prototype USB HSM

2016-04-13 Thread Thierry Moreau
ic threat models, its large size = Who wants to be optimistic with respect to threat models in the current IT landscape? Do you? (I much liked what I glimpsed from the original post.) - Thierry Moreau makes it look rather inco

Re: [cryptography] USG moves to vacate hearing tomorrow due to possible method to unlock iPhone

2016-03-21 Thread Thierry Moreau
forensic tool created for them more than they need the data on this specific iPhone (as I initially guessed), the risk of a bad ruling for them would be a major step back in their creative procurement of forensic tools. Hence the USG would prefer no ruling. Regards, - Thierry Moreau

[cryptography] Diffie-Hellman after the Logjam paper versus IETF RFCs ...

2015-11-19 Thread Thierry Moreau
or not making a contribution out of my opinion (you may use this message as you see fit). Thanks in advance for comments! - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

[cryptography] Diffie-Hellman after the Logjam paper versus IETF RFCs ...

2015-11-19 Thread Thierry Moreau
or not making a contribution out of my opinion (you may use this message as you see fit). Thanks in advance for comments! - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

[cryptography] Curious about FIDO Alliance authentication scheme

2015-09-23 Thread Thierry Moreau
Hi, Here is a quick review of the FIDO alliance authentication proposal [1]. After looking superficially at the specifications documentation [2], I came to the tentative summary below. I did not feel a need to delve into the companion documentation set [3]. Core cryptographic principles:

Re: [cryptography] NIST Workshop on Elliptic Curve Cryptography Standards

2015-05-11 Thread Thierry Moreau
On 05/12/15 00:16, ianG wrote: On 11/05/2015 17:56 pm, Thierry Moreau wrote: On 05/09/15 11:18, ianG wrote: Workshop on Elliptic Curve Cryptography Standards June 11-12, 2015 I doubt the foremost questions will be addressed: To which extent NSA influence motivates NIST in advancing the ECC

Re: [cryptography] NIST Workshop on Elliptic Curve Cryptography Standards

2015-05-11 Thread Thierry Moreau
, but the very challenges of an efficient secure hash algorithm seems to be the root cause, and not the NIST competition process. With ECC, I have less confidence in NIST ability to leverage the cryptographic community contributions. - Thierry Moreau

[cryptography] Entropy is forever ...

2015-04-17 Thread Thierry Moreau
offered for cryptographic purposes but I have just a vague idea of whether and how the open source community might move in this direction. Entropy is forever ... until a data leak occurs. A diamond is forever ... until burglars break in. Regards, - Thierry Moreau

[cryptography] The Evanescent Security Module, one step towards an Open Source HSM

2015-04-01 Thread Thierry Moreau
Hi, here is this new document: The Evanescent Security Module, Concepts and Linux Usage Strategies http://www.connotech.com/doc_ei_secomd.html (Not an April fool announcement despite the funny name for an HSM!) Enjoy! - Thierry Moreau

[cryptography] The Evanescent Security Module, one step towards an Open Source HSM

2015-04-01 Thread Thierry Moreau
Hi, here is this new document: The Evanescent Security Module, Concepts and Linux Usage Strategies http://www.connotech.com/doc_ei_secmod.html (corrected URL) (Not an April fool announcement despite the funny name for an HSM!) Enjoy! - Thierry Moreau

Re: [cryptography] Request - PKI/CA History Lesson

2014-04-29 Thread Thierry Moreau
an RSA technology license acquired prior to RSADSI, and they use certificates without the ASN.1/X.509 paradigms. Regards, - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] Alleged NSA-GCHQ Attack on Jean-Jacques Quisquater

2014-02-02 Thread Thierry Moreau
comsec disclosures may be finally getting legs, not yet long, but more than NDA-official secrecy paralysis. Any other cryptographer attacked (as if it would be known)? -- - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http

Re: [cryptography] Techniques for protecting CA Root certificate Secret Key

2014-01-09 Thread Thierry Moreau
of underlying principles (hint: don't start by reverse engineering the PKCS#12 specifications). You may want to do it best practice and there you go. Good luck -- - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http

Re: [cryptography] Speaking of key management [was Re: Techniques for protecting CA Root certificate Secret]

2014-01-09 Thread Thierry Moreau
: they have much more freedom when doing otherwise. Have fun with key management challenges! -- - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] Techniques for protecting CA Root certificate Secret Key

2014-01-09 Thread Thierry Moreau
Tony Arcieri wrote: On Thu, Jan 9, 2014 at 7:51 AM, Thierry Moreau thierry.mor...@connotech.com mailto:thierry.mor...@connotech.com wrote: I would suggest that the DNSSEC deployment at the root would be a good case study for IT security management, from an historic perspective

Re: [cryptography] Design Strategies for Defending against Backdoors

2013-11-19 Thread Thierry Moreau
ianG wrote: On 18/11/13 20:58 PM, Thierry Moreau wrote: ianG wrote: On 18/11/13 10:27 AM, ianG wrote: In the cryptogram sent over the weekend, Bruce Schneier talks about how to design protocols to stop backdoors. Comments? To respond... https://www.schneier.com/blog/archives/2013/10

Re: [cryptography] Design Strategies for Defending against Backdoors

2013-11-18 Thread Thierry Moreau
agree with. Packets should be deterministically created by the sender, and they should be verifiable by the recipient. Then you lose the better theoretical foundations of probabilistic signature schemes ... -- - Thierry Moreau ___ cryptography

Re: [cryptography] Allergy for client certificates

2013-10-11 Thread Thierry Moreau
enrolled while in fact it no longer works). Solving this issue in your experiment is going to re-introduce much of the PKI complexity. Sorry for asking tough questions, but maybe they would pop up sooner or later if this experiment goes forward. -- - Thierry Moreau

Re: [cryptography] SSL session resumption defective (Re: What project would you finance? [WAS: Potential funding for crypto-related projects])

2013-07-04 Thread Thierry Moreau
to raise their awareness and self-defense against client system insecurity (seldom a cryptographer achievement). -- - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] SSL session resumption defective (Re: What project would you finance? [WAS: Potential funding for crypto-related projects])

2013-07-04 Thread Thierry Moreau
a MITM arrangement is a useful line of defense. I question the marginal benefit of upgrading from a deployed base where DH was omitted at the outset, under the PFS argument alone. Regards, - Thierry Adam On Thu, Jul 04, 2013 at 11:16:21AM -0400, Thierry Moreau wrote: Thanks to Nico

Re: [cryptography] Integrety checking GnuPG

2013-05-30 Thread Thierry Moreau
project, you might find that GPG is an overkill when only hash/signature validation is required. This is sort of a trusting trust question. So you knew the answer already. -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385

Re: [cryptography] Keyspace: client-side encryption for key/value stores

2013-03-25 Thread Thierry Moreau
exhaustion (the time we discuss this vs others ...). -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691 ___ cryptography mailing list cryptography@randombit.net http

Re: [cryptography] Keyspace: client-side encryption for key/value stores

2013-03-21 Thread Thierry Moreau
Peter Gutmann wrote: Jeffrey Walton noloa...@gmail.com writes: Android 4.0 and above also offer a Keychain ( http://developer.android.com/reference/android/security/KeyChain.html). If using a lesser version, use a Keystore ( http://developer.android.com/reference/java/security/KeyStore.html).

Re: [cryptography] side channel analysis on phones

2013-03-09 Thread Thierry Moreau
for hardware-specific threats. [...] how to limit the possibilities of attacking the keys from another app. OK, now you insert O/S abstraction and O/S-specific threats. Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada

Re: [cryptography] Client TLS Certificates - why not?

2013-03-05 Thread Thierry Moreau
the requirement of registration, and still effectively limit abuse? That's the early dream of a global PKI. Nowadays, we know more. Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691

Re: [cryptography] Meet the groundbreaking new encryption app set to revolutionize privacy...

2013-02-07 Thread Thierry Moreau
the emergency landing. Thus the decision to land at the major airport (instead of a secondary airport with less traffic in conflict but lower grade facilities) is taken based on the fail-safe property of the aircraft-to-ATC communications subsystem. Regards, -- - Thierry Moreau

Re: [cryptography] OAEP for RSA signatures?

2013-01-29 Thread Thierry Moreau
Peter Gutmann wrote: Thierry Moreau thierry.mor...@connotech.com writes: The Bleichenbacher attack adaptation to OAEP is non-existent today and would be an even more significant academic result. I must assume that Bleichenbacher would have published results in this direction if his research

Re: [cryptography] OAEP for RSA signatures?

2013-01-28 Thread Thierry Moreau
still remains. Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691 ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo

Re: [cryptography] OAEP for RSA signatures?

2013-01-27 Thread Thierry Moreau
doing this - it is mostly PKCS1, etc, and RFC3447 doesn't enlighten in this direction. Could OAEP be considered reasonable for signatures? or is this a case of totally inappropriate? Or somewhere in between? iang Regards, -- - Thierry Moreau

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-17 Thread Thierry Moreau
is ineffective in the first place against the bad bad boys.) I don't have any answer beyond a suggestion to deploy first for security-critical distributed applications (those would typically not be browser-based). Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-17 Thread Thierry Moreau
James A. Donald wrote: On 2013-01-18 1:17 AM, Thierry Moreau wrote: First, replace client certificate by client PPKP (public-private key pair) and be ready for a significant training exercise. The more the trainee knows about X.509, the greater challenge for the trainer. It has been

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Thierry Moreau
-to-end security should make some sense, even today. Regards, -- - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Thierry Moreau
John Kemp wrote: [...] the _spirit_ of end-to-end semantics is violated here, I believe [...] Personally, I am not a spiritual cryptography believer. -- - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http

Re: [cryptography] Why anon-DH is less damaging than current browser PKI (a rant in five paragraphs)

2013-01-08 Thread Thierry Moreau
innovation more palatable to IT experts. This is how I feel responsible for the hopeless phishing minefield! Regards, -- - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] key exchange patented :)

2012-11-22 Thread Thierry Moreau
above sketchy observation and the press article title. Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691 ___ cryptography mailing list cryptography@randombit.net http

Re: [cryptography] Application Layer Encryption Protocols Tuned for Cellular?

2012-11-04 Thread Thierry Moreau
. HIP also appears as a lightweight IPsec, but certainly others can offer more wisdom in this respect. Not a simple solution, but how could the original post requirements be adequately served by a simple solution? Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de

Re: [cryptography] Just how bad is OpenSSL ?

2012-10-30 Thread Thierry Moreau
Solar Designer wrote: On Tue, Oct 30, 2012 at 11:29:17AM -0400, Thierry Moreau wrote: Isn't memory-space cleanse() isolated from file system specifics except for the swap space? Normally yes, but the swap space may be in a file (rather than a disk partition), or the swap partition may

Re: [cryptography] DKIM: Who cares?

2012-10-26 Thread Thierry Moreau
of CPU load between signer and verifier are reversed (RSA signature is more CPU-intensive, DSA verification is more CPU-intensive). Regards, -- - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman

Re: [cryptography] Social engineering attacks on client certificates (Was ... crypto with a twist)

2012-10-14 Thread Thierry Moreau
Hi Ian! Thanks for this thoughtful feedback. Your first and explicit question (about application security requirement assumptions) deserves an answer. I respond to it (and a few more) and postpone replies to other feedback. ianG wrote: Hi Thierry, On 14/10/12 01:21 AM, Thierry Moreau

Re: [cryptography] Client certificate crypto with a twist

2012-10-10 Thread Thierry Moreau
-value authenticated web session use case. Accordingly, some of the observations above may be out-of-sync with the real world challenges. - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman

Re: [cryptography] Key extraction from tokens (RSA SecurID, etc) via padding attacks on PKCS#1v1.5

2012-07-03 Thread Thierry Moreau
that is you see yourself as an applied cryptographer, spot the oracle. -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691 ___ cryptography mailing list cryptography

Re: [cryptography] Intel RNG

2012-06-21 Thread Thierry Moreau
) draw your own conclusion. Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691 ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net

[cryptography] Intel RNG, questions raised by the report

2012-06-19 Thread Thierry Moreau
-implementation-guide/ -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691 ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] can the German government read PGP and ssh traffic?

2012-06-05 Thread Thierry Moreau
Hi Peter, Replying on the thinking process, not on the fundamentals at this time (we seem to agree on the characteristics of PKC vs else). Peter Gutmann wrote: Thierry Moreau thierry.mor...@connotech.com writes: Unless automated SSH sessions are needed (which is a different problem space

Re: [cryptography] can the German government read PGP and ssh traffic?

2012-05-28 Thread Thierry Moreau
. But it seems inappropriate to assume that better ways are not feasible. Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691 ___ cryptography mailing list cryptography

Re: [cryptography] DIAC: Directions in Authenticated Ciphers

2012-05-09 Thread Thierry Moreau
a notarization use case of crypto, with the attempt to implement the notarization service without the help of a trusted [timestamp/historic evidence] third party. Just my attempt to summarize a lengthy explanation ... no further comments. Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130

Re: [cryptography] PKI in practice: is there a list of (widely deployed) client-certs-issuing CAs?

2012-04-27 Thread Thierry Moreau
Follow-up on my own post below ... Thierry Moreau wrote: A question for those who follow PKI usage trends. Is there a list of CAs that issue X.509 end-user certificates? Here is the rationale for the question: If an end-user has a certificate, he (more or less consciously) controls

[cryptography] PKI in practice: is there a list of (widely deployed) client-certs-issuing CAs?

2012-04-26 Thread Thierry Moreau
observations. Also, the SSL debugging tools will report the contents of CertificateRequest messages from public servers supporting client certs. Anyone went through such data collection before? Thanks in advance. -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal

Re: [cryptography] RSA Moduli (NetLock Minositett Kozjegyzoi Certificate)

2012-03-23 Thread Thierry Moreau
Please let me try to summarize. I guess it is OK to infer from Adam explanations and Peter observation about homegrown CA software implementations used by some CAs that ... The unusual public RSA exponent may well be an indication that the signature key pair was generated by a software

Re: [cryptography] Certificate Transparency: working code

2012-03-01 Thread Thierry Moreau
being addressed and to who does the main benefit accrue / from whom involvement is expected? Once I can see these, I may appreciate Apache and browser backward compatibility features and the like. Thanks for your patience with my scrutiny. -- - Thierry Moreau CONNOTECH Experts-conseils inc

Re: [cryptography] Duplicate primes in lots of RSA moduli

2012-02-22 Thread Thierry Moreau
. Anyway, this whole thing about RSA modulus GCD findings questions us about entropy in a renewed perspective (a reminder that future attack vectors are deemed to be unexpected ones). Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1

Re: [cryptography] Duplicate primes in lots of RSA moduli

2012-02-20 Thread Thierry Moreau
, enjoy! -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691 ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] Duplicate primes in lots of RSA moduli

2012-02-19 Thread Thierry Moreau
Ben Laurie wrote: On Fri, Feb 17, 2012 at 8:39 PM, Thierry Moreau thierry.mor...@connotech.com wrote: Ben Laurie wrote: On Fri, Feb 17, 2012 at 7:32 PM, Thierry Moreau thierry.mor...@connotech.com wrote: Isn't /dev/urandom BY DEFINITION of limited true entropy? $ ls -l /dev/urandom lrwxr-xr

Re: [cryptography] Duplicate primes in lots of RSA moduli

2012-02-17 Thread Thierry Moreau
properties of the (deterministic) PRNG component of /dev/urandom, they can not expand *true* entropy. And this is so, no matter the amount of details you delegate to reputed security software developers. Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier

Re: [cryptography] Complying with GPL V3 (Tivoization)

2012-01-09 Thread Thierry Moreau
, -- - Thierry Moreau ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] airgaps in CAs

2012-01-08 Thread Thierry Moreau
of secure operations (the ICANN DNSSEC root KSK management is the exception). Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691 ___ cryptography mailing list

Re: [cryptography] Non-governmental exploitation of crypto flaws?

2011-11-30 Thread Thierry Moreau
) by the way the triple-DES upgrade project success has been described by a bank technology specialist who would have been aware of the incident(s). - Thierry Moreau Again, I'm not arguing with Drew Gross's observation. It is just a bit extreme to say it like this. Best regards, Ilya

Re: [cryptography] -currently available- crypto cards with onboard key storage

2011-10-28 Thread Thierry Moreau
either pay for the certification gimmick, or you mend your own solution. This is the basis for an open source HSM ... Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691

Re: [cryptography] server-signed client certs (Re: SSL is not broken by design)

2011-09-26 Thread Thierry Moreau
. -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691 iang Adam On Mon, Sep 26, 2011 at 07:52:20AM +1000, ianG wrote: On 25/09/11 10:09 AM, James A. Donald wrote: On 2011-09-25 4:30 AM, Ben Laurie wrote: I'm just saying I

Re: [cryptography] Let's go back to the beginning on this

2011-09-12 Thread Thierry Moreau
explicit about identity assertion model. But the other two models are operating here and there in the IT security landscape. -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1 Tel. +1-514-385-5691

Re: [cryptography] RDRAND and Is it possible to protect against malicious hw accelerators?

2011-06-20 Thread Thierry Moreau
in a virtualization environment be provided with a) a secret random source, b) a place to store long-term secrets, and c) some mechanism for external assessment of software integrity? Regards, -- - Thierry Moreau CONNOTECH Experts-conseils inc. 9130 Place de Montgolfier Montreal, QC, Canada H2M 2A1

Re: [cryptography] True Random Source, Thoughts about a Global System Perspective

2011-01-26 Thread Thierry Moreau
Peter Gutmann wrote: Thierry Moreau thierry.mor...@connotech.com writes: As a derived engineering strategy, wouldn't it be better to design a system where the long-term secrets are kept in a secure co-processor, Yes, of course, but that's asking the wrong question, what you need to ask

Re: [cryptography] True Random Source, Thoughts about a Global System Perspective

2011-01-26 Thread Thierry Moreau
) secret protection in the application deterministic processing, you may as well apply secret protection mechanisms to the PRNG state, and enjoy the peace of mind (modulo above bla bla bla) provided by a good PRNG design. -- - Thierry Moreau