Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-24 Thread coderman
On Wed, Nov 24, 2010 at 2:16 PM, Marsh Ray wrote: > ... > So are you saying it is or it isn't Cloud-Compliant? hah, i rant at length on the mistaken security assumptions of cloud computing. (remember when it was grid computing?, and before that ...) i'll try to stay on topic. *grin* > What fre

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-24 Thread Marsh Ray
On 11/24/2010 02:11 PM, coderman wrote: On Wed, Nov 24, 2010 at 2:49 AM, Marsh Ray wrote: (that's the abridged version. this is actually more complicated than many assume, and i've written my own egd's in the past to meet need.) Ya. How does this feature interact with virtualization? for

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-24 Thread coderman
On Wed, Nov 24, 2010 at 2:49 AM, Marsh Ray wrote: > ... > How would you know if it was working properly? Or backdoored? use an entropy gathering daemon to verify sanity checks on output, obscure generator state through digest or cipher, and finally mix this entropy at conservative density entropy

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-24 Thread Marsh Ray
On 11/24/2010 02:58 AM, coderman wrote: On Tue, Nov 23, 2010 at 10:43 PM, Marsh Ray wrote: How about all the weak and insufficiently seeded RNGs out there? it's more than a little annoying how many accelerated crypto implementations exist while good entropy is still a scarcity. why isn'

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-24 Thread coderman
On Tue, Nov 23, 2010 at 10:43 PM, Marsh Ray wrote: > > How about all the weak and insufficiently seeded RNGs out there? it's more than a little annoying how many accelerated crypto implementations exist while good entropy is still a scarcity. why isn't this a native instruction on every arc

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-23 Thread Marsh Ray
On 11/23/2010 04:31 PM, travis+ml-rbcryptogra...@subspacefield.org wrote: On Sat, Nov 20, 2010 at 01:10:53PM +1000, James A. Donald wrote: Ian G wrote: The result of 15-20 years is that nobody has ever lost money because of a cryptographic failure, to a high degree of reliability. How about a

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-23 Thread travis+ml-rbcryptography
On Tue, Nov 23, 2010 at 02:31:25PM -0800, travis+ml-rbcryptogra...@subspacefield.org wrote: > IMHO, having attackers move to other systems (or attack parts of a > system you designed), is a sign of success, not failure. If you > designed that system (or part), that's the best possible outcome. E

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-23 Thread James A. Donald
On 2010-11-24 8:31 AM, travis+ml-rbcryptogra...@subspacefield.org wrote: Successful systems tend to be evolutionary rather than revolutionary when there's a non-trivial ecosystem around them. The fundamental security flaw is that we have a name system that does not scale. Evolution rather tha

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-23 Thread Ian G
On 24/11/10 7:51 AM, travis+ml-rbcryptogra...@subspacefield.org wrote: On what basis do you make the (implicit) assumption that cert privkeys were actually stolen? For me, it would be Preponderance of evidence, or in non-legal terms "more likely than not." Note; I do not claim to have any

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-23 Thread travis+ml-rbcryptography
On Sat, Nov 20, 2010 at 01:10:53PM +1000, James A. Donald wrote: > Ian G wrote: >> The result of 15-20 years is that nobody has ever lost money because of >> a cryptographic failure, to a high degree of reliability. > > How about all the money lost because Wifi security does not work? How about ac

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-23 Thread travis+ml-rbcryptography
On what basis do you make the (implicit) assumption that cert privkeys were actually stolen? Note; I do not claim to have any evidence the pubkeys were factored, etc., I'm just wondering on what basis you jump to assuming it was a node security failure. -- Good code works on most inputs; correct

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-21 Thread Peter Gutmann
Ian G writes: >It sucks so badly, I decided in future that the only moral and ethical way >one could use the words encryption or security or the like in any >conversation was if the following were the case: > > there is only one mode, and it is secure. Something similar was done by the CORBA

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-21 Thread Ian G
On 21/11/10 8:37 AM, Marsh Ray wrote: On 11/19/2010 05:39 PM, Ian G wrote: I don't think this qualifies as a bait-and-switch scenario because the originally-advertised functionality (the bait) is still part of the package. :) Bait-and-switch would be more like a salesperson saying "No, I'

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-20 Thread coderman
On Sat, Nov 20, 2010 at 1:37 PM, Marsh Ray wrote: > ... > The best term for this that I can think of is plain old "exaggeration", but > I don't feel like that really captures the idea. It's more that the claims > are extended beyond their original domain, to the point where they may no > longer ap

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-20 Thread Marsh Ray
On 11/19/2010 05:39 PM, Ian G wrote: On 20/11/10 6:26 AM, travis+ml-rbcryptogra...@subspacefield.org wrote: Does the fact that parts of Stuxnet was signed by two valid certs count as a cryptographic failure? Short answer: no. Medium answer: if you look at the so-called Internet Threat Model

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-20 Thread Rayservers
Hello Ian, On 19/11/10 23:39, Ian G wrote: > On 20/11/10 6:26 AM, travis+ml-rbcryptogra...@subspacefield.org wrote: >> On Sat, Oct 16, 2010 at 12:29:07PM +1100, Ian G wrote: >>> On this I would demure. We do have a good metric: losses. Risk >>> management starts from the business, and then move

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-19 Thread Peter Gutmann
travis+ml-rbcryptogra...@subspacefield.org writes: >Does the fact that parts of Stuxnet was signed by two valid certs >count as a cryptographic failure? The crypto worked perfectly, it was everything around it that failed. (Which has been the case for every other security failure involving modern

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-19 Thread Randall Webmail
> > A common, perhaps the most common, attack on corporations is > to get > > inside the corporate network through wifi, then mount an sql > injection> attack on the corporate database, then steal the > corporate database. > > This often causes extremely large monetary losses. A very large perc

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-19 Thread Ian G
On 20/11/10 2:10 PM, James A. Donald wrote: Ian G wrote: On this I would demure. We do have a good metric: losses. Risk management starts from the business, and then moves on to how losses are effecting that business, which informs our threat model. We now have substantial measureable history o

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-19 Thread James A. Donald
Ian G wrote: On this I would demure. We do have a good metric: losses. Risk management starts from the business, and then moves on to how losses are effecting that business, which informs our threat model. We now have substantial measureable history of the results of open use of cryptography.

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-19 Thread Chris Palmer
Ian G writes: > As I say, highly counter-culture and widely disagreed :) Really? I think this audience at least is likely to agree with you. I do, particularly your hypothesis 5 (I learned it from Saltzer et al.). Granted, there are all these people who believe that DNS and BGP and so on should

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-19 Thread Jon Callas
> > Does the fact that parts of Stuxnet was signed by two valid certs > count as a cryptographic failure? > Of course not. Does it count as a DMV failure if a bank robber has a valid drivers license? None of us have ever claimed that only good people can use cryptography. As a matter of fact,

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-19 Thread Ian G
On 20/11/10 6:26 AM, travis+ml-rbcryptogra...@subspacefield.org wrote: On Sat, Oct 16, 2010 at 12:29:07PM +1100, Ian G wrote: On this I would demure. We do have a good metric: losses. Risk management starts from the business, and then moves on to how losses are effecting that business, which

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-19 Thread travis+ml-rbcryptography
On Sat, Oct 16, 2010 at 12:29:07PM +1100, Ian G wrote: > On this I would demure. We do have a good metric: losses. Risk > management starts from the business, and then moves on to how losses are > effecting that business, which informs our threat model. > > We now have substantial measureabl

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-11-18 Thread travis+ml-rbcryptography
On Thu, Oct 14, 2010 at 01:32:41PM -0500, Marsh Ray wrote: > No one's yet published a preimage for MD5, a seriously broken 128 bit > function, so I doubt you'll find anyone who will express confidence that > they can find a preimage for any reasonable 384 or 512 bit hash function. Only one pro

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-15 Thread Jon Callas
On Oct 15, 2010, at 7:15 PM, James A. Donald wrote: > On 2010-10-16 6:33 AM, Jon Callas wrote: > > If you assume that there are Moore's-Law-Equivalent > > increases in compute power indefinitely, then 128-bit > > security is good until about 2050-2060, and 256-bit > > security is good until 2150

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-15 Thread James A. Donald
On 2010-10-16 6:33 AM, Jon Callas wrote: > If you assume that there are Moore's-Law-Equivalent > increases in compute power indefinitely, then 128-bit > security is good until about 2050-2060, and 256-bit > security is good until 2150 or so. On the one hand, we know > that semiconductor improvemen

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-15 Thread Ian G
Hi Steven and all, On 16/10/10 1:56 AM, Steven Bellovin wrote: There are many possible answers to your query -- including, of course, "you're right" -- but maybe we should be a little bit more charitable. Maybe, in fact, they're right. I think one of the flaws in all this is the old "w

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-15 Thread Jon Callas
Zooko, Let me try to explain the rationale for some of this. Note that explaining is not the same thing as agreeing with. I have to give a small ironic smile to hear you ask these questions while you've also advocated for hundred-year digital signatures. If you want hundred-year crypto, you wa

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-15 Thread Steven Bellovin
There are many possible answers to your query -- including, of course, "you're right" -- but maybe we should be a little bit more charitable. Maybe, in fact, they're right. The real goal is a certain degree of security -- an enemy cannot usefully attack it. By "useful" I mean "in time to caus

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-15 Thread Marsh Ray
On 10/14/2010 10:09 PM, Zooko O'Whielacronx wrote: This part is a technical mistake, see http://cr.yp.to/hash/collisioncost-20090517.pdf . I wouldn't be surprised if you are right that this is how NIST came up with the requirement for a 512-bit hash function though. NIST may not really need

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-14 Thread Morlock Elloi
It's because cryptographers don't really have more imagination than, say, TV screen OEMs: bigger is better, simply because they don't know to do anything else. It doesn't matter that there is no bandwidth to fill that screen, that there is really no content worth watching, that the effective ang

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-14 Thread Zooko O'Whielacronx
I like the way you think. On Thu, Oct 14, 2010 at 12:32 PM, Marsh Ray wrote: >> >> What if a hash has 512-bit collision-resistance? What would that mean? >> That an attacker might spend about 2^512 resources to find a collision >> in it? > > The attacker can match any hash he generates with any o

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-14 Thread Zooko O'Whielacronx
Oh, and now I need to follow-up to my follow-up to correct an over-simplification. On Thu, Oct 14, 2010 at 8:33 PM, Zooko O'Whielacronx wrote: > I know that collision resistance > is approximately as difficult to achieve as the square of pre-image > resistance is. Actually the above is true only

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-14 Thread Zooko O'Whielacronx
Following-up to my own post to correct a goof: On Wed, Oct 13, 2010 at 10:56 PM, Zooko O'Whielacronx wrote: > > If a hash has 32-bit pre-image-resistance then this means an attacker > might spend about 2^32 resources to find a pre-image. > > If a hash has 64-bit pre-image-resistance then this mea

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-14 Thread Marsh Ray
On 10/14/2010 02:49 PM, Samuel Neves wrote: On 14-10-2010 19:32, Marsh Ray wrote: 3. There are quantum computer attacks theorized which appear to cut the exponent in half again. Thus a 256 bit hash could possibly be collided in 264 operations on some future machine. Is there a source for this

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-14 Thread Samuel Neves
On 14-10-2010 19:32, Marsh Ray wrote: > 3. There are quantum computer attacks theorized which appear to cut > the exponent in half again. Thus a 256 bit hash could possibly be > collided in 264 operations on some future machine. Is there a source for this? The only quantum approach I've heard of,

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-14 Thread Marsh Ray
On 10/13/2010 11:56 PM, Zooko O'Whielacronx wrote: What if a hash has 512-bit collision-resistance? What would that mean? That an attacker might spend about 2^512 resources to find a collision in it? The attacker can match any hash he generates with any other, not just one specific target val

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-14 Thread Ian G
On 14/10/10 3:56 PM, Zooko O'Whielacronx wrote: In any case, I'm pretty sure that as a *user* of hash functions what I care about is "more likely to fail" (and efficiency), not about "bits of security" for any bit-level greater than about 128 (including consideration of quantum attacks, multi-ta

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-14 Thread Paul Crowley
On 14/10/10 05:56, Zooko O'Whielacronx wrote: What if a hash has 512-bit collision-resistance? What would that mean? That an attacker might spend about 2^512 resources to find a collision in it? That is a meaningless possibility to discuss since 2^512 resources will never exist in the life of thi

Re: [cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-14 Thread Peter Gutmann
"Zooko O'Whielacronx" writes: >What if a hash has 512-bit collision-resistance? What would that mean? That the phenomenon of zero-risk bias is alive and flourishing in the security fashion industry? Peter. ___ cryptography mailing list cryptography@ra

[cryptography] philosophical question about strengths and attacks at impossible levels

2010-10-13 Thread Zooko O'Whielacronx
Dear cryptography@randombit.net: I just sent this letter to a mailing list of SHA-3 designers. I thought you might be interested in the general question. Regards, Zooko Folks: If a hash has 32-bit pre-image-resistance then this means an attacker might spend about 2^32 resources to find a pre-i