Re: [cryptography] "Against Rekeying"

2010-03-23 Thread Adam Back
In anon-ip (a zero-knowledge systems internal project) and cebolla [1] we provided forward-secrecy (aka backward security) using symmetric re-keying (key replaced by hash of previous key). (Backward and forward security as defined by Ross Anderson in [2]). But we did not try to do forward securit

Re: [cryptography] OpenSSL 1.0.0 released

2010-03-31 Thread Adam Back
I dont believe it was intended to be rude, just a tongue in cheek way of saying that the attack is impractical or inapplicable to openSSL. You have to have a bit of history perhaps to appreciate Peter's comments - he's actually the author of many very funny and insightful comments and articles on

Re: [cryptography] short signature scheme?

2010-11-08 Thread Adam Back
I guess DSA should give 40 bytes +- a bit of boiler plate. I have some code at http://www.cypherspace.org/openpgp/pgpdsa/ that creates and verifies somewhat PGP/GPG compatible DSA sigs. (It uses openssl for the bignum library I use DSA_do_sign & DSA_do_verify). Adam On Mon, Nov 08, 2010 at 10:

Re: [cryptography] Embrace the decline!

2010-11-16 Thread Adam Back
You know I didnt see any spam on here, so probably there is either moderation or subscriber only posting - and you get to see the conversation progress within minutes instead of days/weeks, so I am not complaining personally. Its kind of hard to have a conversation with weeks of gap - the only re

Re: [cryptography] NSA's position in the dominance stakes

2010-11-18 Thread Adam Back
So a serious question: is there a software company friendly jurisdiction? (Where software and algorithm patents do not exist under law?) If patent trolls can patent all sorts of wheels and abuse the US and other jurisdictions flawed patent system, maybe one can gain business advantage by incorpo

Re: [cryptography] NSA's position in the dominance stakes

2010-11-19 Thread Adam Back
. Adam On Thu, Nov 18, 2010 at 08:43:44PM -0500, Steven Bellovin wrote: On Nov 18, 2010, at 5:21 16PM, Adam Back wrote: So a serious question: is there a software company friendly jurisdiction? (Where software and algorithm patents do not exist under law?) It won't help, if you want to

[cryptography] patents and stuff (Re: NSA's position in the dominance stakes)

2010-11-20 Thread Adam Back
Yep another xor-curosor or actually even worse. Retarded. A few years back, at Zero-Knowledge Systems (privacy tech company Montreal, Canada - once home of the "freedom" network and a few cypherpunks etc) the CEO Austin Hill wanted to patent some "stuff". We were grumbling and saying "please do

Re: [cryptography] NSA's position in the dominance stakes

2010-11-20 Thread Adam Back
I'm sure one can come up with minor variant schemes. The arguable area is between patents which are intentionally drawn up to cover as much as possible and people who bother to read the patents and then try to use some minor variant that is different. But also its a minefield so the offical poli

Re: [cryptography] patents and stuff (Re: NSA's position in the dominance stakes)

2010-11-21 Thread Adam Back
Hi James I think, a bit of ranting aside, what people dislike is that software patents are a net lose to the economy, software progress and meritocracy. The patent mine-field isnt good for the industry nor society as a whole as it adds economic friction, uncertainty and therefore holds back pro

Re: [cryptography] patents and stuff (Re: NSA's position in the dominance stakes)

2010-11-21 Thread Adam Back
Well not to fan the flames etc but a patent attorney presumably helped write up the one click, and a patent examiner agreed that it was patent worthy. Wiki also has some things to say about why patent standards are falling - examinse are overworked, quota driven civil servants... http://en.wik

Re: [cryptography] current digital cash / anonymous payment projects?

2010-12-01 Thread Adam Back
For the technology, to play with it I have Brands and Chaum credentials implemented in this library: http://cypherspace.org/credlib/ It was an experiment in simplifying the APIs so I think its rather simple to use. Using credentials as an ecash coin is a simple use-case. For Chaum you

Re: [cryptography] is Perry ok?

2010-12-23 Thread Adam Back
This new crypto list seems to be ok... maybe he wants to just email the list members who didnt already subscribe to both. Adam On Thu, Dec 23, 2010 at 11:15:36AM -0500, Steven Bellovin wrote: On Dec 23, 2010, at 9:43 38AM, Jack Lloyd wrote: On Thu, Dec 23, 2010 at 12:02:35AM -0800, travis+

Re: [cryptography] True Random Source, Thoughts about a Global System Perspective

2011-01-25 Thread Adam Back
I think for its flaws, its still significantly useful that a FIPS algorithm or crypto library certificate certifies that an implementation passes its test vectors, startup tests etc. It gives some reasonable assurance that the algorithm is implemented according to the spec, and typically some tho

Re: [cryptography] True Random Source, Thoughts about a Global System Perspective

2011-01-26 Thread Adam Back
You should presume your CPRNG output is public (eg published on the web) What we are talking about in the real world is C_P_RNGs and the C cryptographic means its suitable for crypto uses, and pseudo means its a tool for stretching some adequate supply of real entropy (eg 128-bits, 256-bits or w

Re: [cryptography] deniable store and forward with integrity protection?

2011-02-15 Thread Adam Back
Ian Brown and I proposed a simpler, non-interactive, approach for use in openPGP we called "non-transferable signatures" http://www.cs.ucl.ac.uk/staff/i.brown/nts.htm The basic idea is you use an integrity protected (non-malleable) symmetric encryption option in PGP, and then change the

[cryptography] RSA admits securID tokens have been compromised

2011-06-07 Thread Adam Back
http://www.net-security.org/secworld.php?id=11122 "RSA has finally admitted publicly that the March breach into its systems has resulted in the compromise of their SecurID two-factor authentication tokens." I guess everyone was suspecting as much reading between the lines of what was said so far

Re: [cryptography] attacks against bitcoin

2011-06-12 Thread Adam Back
I was thinking a DoS might be a problem. If you could prevent the p2p network broadcasting or receiving broadcasts, maybe you could be the only person able to proceed with minting. If you could keep that up for a while you could reduce the difficulty and create bitcoins with lower cost. A full

Re: [cryptography] Digital cash in the news...

2011-06-13 Thread Adam Back
Bitcoin is not a pyramid scheme, and doesnt have to have the collapse and late joiner losers. If bitcoin does not lose favor - ie the user base grows and then maintains size of user base in the long term, then no one loses. I think in the current phase the deflation (currency increasing in value

Re: [cryptography] Digital cash in the news...

2011-06-13 Thread Adam Back
to saturation, the remaining deflation would be limited by the underlying population and economic growth. That might be workable rate of deflation. Adam On Mon, Jun 13, 2011 at 11:55:38PM +1000, Ian G wrote: On 13/06/11 5:54 PM, Adam Back wrote: Bitcoin is not a pyramid scheme, and doesnt have

[cryptography] sander & ta-shma + bitcoin, b-money, hashcash (Re: Is BitCoin a triple entry system?)

2011-06-14 Thread Adam Back
See also: Auditable Anonymous Electronic Cash by Tomas Sander and Amnon Ta-Shma in crypto 1998. http://www.math.tau.ac.il/~amnon/Papers/ST.crypto99.pdf Its basically the idea of using non-interactive zero knowlede proof of membership in a list of coins as an alternative to blinding. The intere

Re: [cryptography] sander & ta-shma + bitcoin, b-money, hashcash (Re: Is BitCoin a triple entry system?)

2011-06-15 Thread Adam Back
On Tue, Jun 14, 2011 at 07:40:10PM +1000, James A. Donald wrote: It is not a design, but an idea for a design. There is no efficient zero knowledge proof that has the required properties. On 2011-06-14 6:13 PM, Adam Back wrote: [...] They use Merkle trees to improve the computation efficiency

[cryptography] crypto & security/privacy balance (Re: Digital cash in the news...)

2011-06-15 Thread Adam Back
Well said StealthMonger, I suspect Nico is in the minority on this list with that type of view. I read Nico's later reply also. Short of banning crypto privacy and security rights stand a better chance of being balanced by more deployment of crypto. (In terms of warrantless wiretaps etc which s

[cryptography] not unsubscribing (Re: Unsubscribing)

2011-06-16 Thread Adam Back
Trust me the noise level on here is zero compared to usenet news flame fests, spam, DoS etc. The maintainer is removing spam for one (I think). Personally I find it kind of annoying when people want to squelch any interesting discussion about societal implications as that is part of what is inte

Re: [cryptography] Bitcoin observation

2011-07-05 Thread Adam Back
I dont think you can prove you have destroyed a bitcoin, neither your own bitcoin, nor someone else's. To destroy it you would have to prove you deleted the coin private key, and you could always have an offline backup. You could uncreate a coin by creating a chain removing it from existance, by

Re: [cryptography] Bitcoin observation

2011-07-05 Thread Adam Back
Maybe one could introduce a way to destroy coins. eg transfer it to "/dev/null" by signing a transfer to an obviously non-existant key-fingerprint like all s or such. But I guess provable coin destruction is not a mainstream "feature"! Adam On Tue, Jul 05, 2011 at 12

Re: [cryptography] Bitcoin observation

2011-07-08 Thread Adam Back
I thought I already said this in another message, but perhaps it didnt get to the list. Apart from the fact that they have some kind of script which trivially allows you to set the conditions of validity to something impossible to satisfy eg 0 = 1 that Seth Schoen described; the key in the signat

[cryptography] ssh-keys only and EKE for web too (Re: preventing protocol failings)

2011-07-13 Thread Adam Back
You know this is why you should use ssh-keys and disable password authentication. First thing I do when someone gives me an ssh account. ssh-keys is the EKE(*) equivalent for ssh. EKE for web login is decades overdue and if implemented and deployed properly in the browser and server could prett

Re: [cryptography] Symantec gets it wrong

2011-09-08 Thread Adam Back
I agree - if your bargain basement $15 site CA gets hacked and delisted, just buy another cert from the next in line for $20 and install it on your server. Problem solved. Your only cost is replacing your cert between when the problem is announced and hopefully before the delisting kicks in. I

[cryptography] wont CA hackers CA pin also? and other musings (Re: PKI "fixes" that don't fix PKI (part III))

2011-09-10 Thread Adam Back
So I hear CA pinning mentioned a bit as a probable way forward, but I didnt see anyone define it on this list, so from web search what I can find is that certificate holder can define the CAs that are allowed to issue certs for its domain. Maybe a bit analogous to SPF for email. (Anyone have a d

[cryptography] server-signed client certs (Re: SSL is not "broken by design")

2011-09-25 Thread Adam Back
What about introducing the concept of server signed client certs. A server could recognize its own server key pair signature on the client cert, even though the server cert is not a proper CA cert. Then the password request on the client goes to the browser/os key store. So long as you had CA p

[cryptography] ECDSA - patent free?

2011-11-09 Thread Adam Back
Anyone have informed opinions on whether ECDSA is patent free? Any suggestions on EC capable crypto library that implements things without tripping over any certicom claimed optimizations? (Someone pointed out to me recently that the redhat shipped openSSL is devoid of ECC which is kind of a n

Re: [cryptography] fyi: Sovereign Keys: an EFF proposal for more secure TLS authentication

2011-11-26 Thread Adam Back
I only skimmed the high level but I presume they would be using a merkle hash-tree and time-stamp server or something like that so it cant revise its story later and its current state can be audited by anyone against its advertised information. Adam On Sat, Nov 26, 2011 at 11:36:11PM +1100, ianG

Re: [cryptography] fyi: Sovereign Keys: an EFF proposal for more secure TLS authentication

2011-11-27 Thread Adam Back
cal area. Adam On Sun, Nov 27, 2011 at 08:12:00AM +0200, Martin Paljak wrote: No, they had ecc and I saw no references to hash chains or trees. But that would be a right/interesting direction. On Nov 27, 2011 12:42 AM, "Adam Back" wrote: I only skimmed the high level but I presume the

Re: [cryptography] trustable self-signed certs in a P2P environment (freedombox)

2011-11-30 Thread Adam Back
Its rather common for people with load balancers and lots of servers serving the same domain to have multiple certs. Same for certs to change to a new CA before expiry. (Probably switched to a new CA when adding more servers to the load balanced web server farm). I installed cert patrol and the

[cryptography] really sub-CAs for MitM deep packet inspectors? (Re: Auditable CAs)

2011-11-30 Thread Adam Back
Are there really any CAs which issue sub-CA for "deep packet inspection" aka doing MitM and issue certs on the fly for everything going through them: gmail, hotmail, online banking etc. I saw Ondrej Mikle also mentions this concept in his referenced link from recent post: https://mail1.eff.org/p

Re: [cryptography] really sub-CAs for MitM deep packet inspectors? (Re: Auditable CAs)

2011-12-01 Thread Adam Back
It does at least say they need a certificate practice statement, and hardware key generation and storage, AND "All domains must be owned by the enterprise customer". They can sell the ability to be a sub-CA if they want to. There standards seem probably as good as your average CA and precludes M

Re: [cryptography] really sub-CAs for MitM deep packet inspectors? (Re: Auditable CAs)

2011-12-02 Thread Adam Back
Well I was aware of RA things where you do your own RA and on the CA side they limit you to issuing certs belonging to you, if I recall thawte was selling those. (They pre-vet your ownership of some domains foocorp.com, foocorpinc.com etc, and then you can issue www.foocorp.com, *.foocorp.com ..

[cryptography] if MitM via sub-CA is going on, need a name-and-shame catalog (Re: really sub-CAs for MitM deep packet inspectors?)

2011-12-02 Thread Adam Back
ations of privacy in work places (and obviously public places). More below: On Fri, Dec 02, 2011 at 11:02:14PM +1300, Peter Gutmann wrote: Adam Back writes: Start of the thread was that Greg and maybe others claim they've seen a cert in the wild doing MitM on domains the definitionally do N

Re: [cryptography] if MitM via sub-CA is going on, need a name-and-shame catalog (Re: really sub-CAs for MitM deep packet inspectors?)

2011-12-02 Thread Adam Back
On Sat, Dec 03, 2011 at 01:00:14AM +1300, Peter Gutmann wrote: I was asked not to reveal details and I won't, Of course, I would do the same if so asked. But there are lots of people on the list who have not obtained information indirectly, with confidentiality assurances offered, and for them

Re: [cryptography] if MitM via sub-CA is going on, need a name-and-shame catalog (Re: really sub-CAs for MitM deep packet inspectors?)

2011-12-02 Thread Adam Back
I wonder what that even means. *.com issued by a sub-CA? that private key is a massive risk if so! I wonder if a *.com is even valid according to browsers. Or * that would be funny. Adam On Sat, Dec 03, 2011 at 02:24:53AM +1300, Peter Gutmann wrote: Adam Back writes: [WAP wildcard certs

[cryptography] so can we find a public MitM cert sample? (Re: really sub-CAs for MitM deep packet inspectors?)

2011-12-05 Thread Adam Back
I have to say I have my doubts that either Boingo or Sheraton hotels, or other providers would be doing MitM for advertising/profiling or whatever reasons to their respective wifi services. Absent certs showing this, its a significantly controversial claim, and there are many many reasons you can

Re: [cryptography] really sub-CAs for MitM deep packet inspectors? (Re: Auditable CAs)

2011-12-06 Thread Adam Back
Someone should re-test that Three 3g data + bluecoat content-filtering -as-a-service with SSL and give us the cert if the answer is "interesting" :) Most of the parental control and site blocking things are trivially breakable. For example my router can block domains .. but its mechanism is idi

Re: [cryptography] really sub-CAs for MitM deep packet inspectors? (Re: Auditable CAs)

2011-12-06 Thread Adam Back
authorize you or CAs to subverting the SSL guarantee and other people's security. Even people who have internal CAs for certification SHOULD NOT be abusing them for MitM. Adam On Tue, Dec 06, 2011 at 10:52:43AM +, Florian Weimer wrote: * Adam Back: Are there really any CAs which issue sub-C

Re: [cryptography] Another CA hacked, it seems.

2011-12-08 Thread Adam Back
Did they successfully hack the CA functionality or just a web site housing network design documents for various dutch government entities? From what survives google translate of the original dutch it appears to be the latter no? And if Kerckhoff's principle was followed what does it matter if so

Re: [cryptography] airgaps in CAs

2011-12-09 Thread Adam Back
Hi Arshad Do the air gapped private PKI root certs (and if applicable their non-airgapped sub-CA certs they authorize) have the critical name constraint extension eg ".foocorp.com" meaning it is only valid for creating certs for *.foocorp.com? (I am presuming these private PKI certs are sub-CA c

Re: [cryptography] airgaps in CAs

2011-12-13 Thread Adam Back
the new cert? Adam On Mon, Dec 12, 2011 at 06:21:41PM -0800, Arshad Noor wrote: On 12/9/2011 12:27 AM, Adam Back wrote: Do the air gapped private PKI root certs (and if applicable their non-airgapped sub-CA certs they authorize) have the critical name constraint extension eg ".foocor

Re: [cryptography] How are expired code-signing certs revoked? (nonrepudiation)

2011-12-22 Thread Adam Back
Stefan Brands credentials [1] have an anti-lending feature where you have to know all of the private components in order to make a signature with it. My proposal related to what you said was to put a high value ecash coin as one of the private components. Now they have a direct financial incenti

[cryptography] implementation of NIST SP-108 KDFs?

2011-12-28 Thread Adam Back
As there are no NIST KAT / test vectors for the KDF defined in NIST SP 108, I wonder if anyone is aware of any open source implementations of them to use for cross testing? Adam ___ cryptography mailing list cryptography@randombit.net http://lists.rando

Re: [cryptography] Password non-similarity?

2012-01-02 Thread Adam Back
On 2 January 2012 03:01, ianG wrote: >>> When I was a rough raw teenager doing this, I needed around 2 weeks to >>> pick up 5 letters from someone typing like he was electrified.  The other 3 >>> were crunched in 4 hours on a vax780. >> >> how many samples? (distinct shoulder surf events) > > > Ab

Re: [cryptography] reports of T-Mobile actively blocking crypto

2012-01-11 Thread Adam Back
You know I also noticed mail sending problems when I was in the UK a month or two ago. I am transit via heathrow right now, and now I have no problem. This is pay as you go t-mobile. So maybe they saw the PR problem brewing and stopped whatever they were doing. One gotcha (though I am sure it

[cryptography] trustwave admits issuing corporate mitm certs

2012-02-12 Thread Adam Back
So it happened, per recent discussion on this list, it seems that at least one CA *has* been issuing sub-CA certs for corporate use in mitm boxes. http://www.infoworld.com/d/security/trustwave-admits-issuing-man-in-the-middle-digital-certificate-185972 mozilla is threatening to remove the CA fro

Re: [cryptography] how many MITM-enabling sub-roots chain up to public-facing CAs ?

2012-02-14 Thread Adam Back
Well I am not sure how they can hope to go very far underground. Any and all users on their internal network could easily detect and anonymously report the mitm cert for some public web site with out any significant risk of it being tracked back to them. Game over. So removal of one CA from a m

Re: [cryptography] how many MITM-enabling sub-roots chain up to public-facing CAs ?

2012-02-14 Thread Adam Back
My point is this - say you are the CEO of a CA. Do you want to bet your entire company on no one ever detecting nor reporting the MITM sub-CA that you issued? I wouldnt do it. All it takes is one savy or curious guy in a 10,000 person company. Consequently if there are any other CAs that have

Re: [cryptography] Duplicate primes in lots of RSA moduli

2012-02-17 Thread Adam Back
Further the fact that the entropy seeding is so bad that some implementations are generating literally the same p value (but seemingly different q values) I would think you could view the fact that this can be detected and efficiently exploited via batch GCD as an indication of an even bigger probl

Re: [cryptography] Duplicate primes in lots of RSA moduli

2012-02-18 Thread Adam Back
, how hard can it be etc. There's a psychological theory of why this kind of thing happens in general - the Dunning-Kruger effect. But maybe 1 happened. Adam [1] http://en.wikipedia.org/wiki/Dunning–Kruger_effect On 18 February 2012 07:57, Peter Gutmann wrote: > Adam Back writes: &g

Re: [cryptography] Duplicate primes in lots of RSA moduli

2012-02-18 Thread Adam Back
t is quite plausible for this case... the effect would be rather like observed. Adam On 18 February 2012 10:40, Adam Back wrote: > I also was pondering as to how the implementers could have arrived at > this situation towards evaluating Stephen Farrell's draft idea to have > a servi

Re: [cryptography] Duplicate primes in lots of RSA moduli

2012-03-05 Thread Adam Back
Further the fact that the entropy seeding is so bad that some implementations are generating literally the same p value (but seemingly different q values) I would think you could view the fact that this can be detected and efficiently exploited via batch GCD as an indication of an even bigger prob

Re: [cryptography] The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)

2012-03-23 Thread Adam Back
You know PFS while a good idea, and IMNSO all non-PFS ciphersuites should be deprecated etc, PFS just ensures the communicating parties delete the key negotiation emphemeral private keys after use. Which does nothing intrinsic to prevent massive computation powered 1024 discrete log on stored PFS

Re: [cryptography] RSA Moduli (NetLock Minositett Kozjegyzoi Certificate)

2012-03-23 Thread Adam Back
I presume its implied (too much tongue in cheek stuff for my literal brain to interpret) but a self-signed CA cert is a serious thing - thats a sub-CA cert typically. How that came to be signed with a bizarre though legal e parameter is scary - what library or who wrote the code etc. Usual reaso

Re: [cryptography] RSA Moduli (NetLock Minositett Kozjegyzoi Certificate)

2012-03-23 Thread Adam Back
ight is a performance trick for modexp which involves more multiply operations for higher hamming weight. Adam On Fri, Mar 23, 2012 at 03:05:48PM +0100, Adam Back wrote: I presume its implied (too much tongue in cheek stuff for my literal brain to interpret) but a self-signed CA cert is a serious thin

Re: [cryptography] Key escrow 2012

2012-03-30 Thread Adam Back
As I recall people were calling the PGP ADK feature corporate access to keys, which the worry was, was only policy + config away from government access to keys. I guess the sentiment still stands, and with some justification, people are still worried about law enforcement access mechanisms for in

Re: [cryptography] PINS and [Short] Passwords

2012-04-04 Thread Adam Back
Surely one cant think of the limitations (requirement for cooperation from the OS to test the PIN) as if they are cryptographic limitations... Apple probably supplies such a service themself to law enforcement as a private apple approved ready-to-go app. Adam On Wed, Apr 04, 2012 at 03:45:09PM

Re: [cryptography] PINS and [Short] Passwords

2012-04-06 Thread Adam Back
The bit tying in to my comment a few days ago is they note that apple wont confirm but no doubt does provide a signed private app that takes the encrypted key material off the device for brute forcing. And an app for dumping all data off the device if thats also not possible without jail breaking

[cryptography] SHA1 extension limitations (Re: Doubts over necessity of SHA-3 cryptography standard)

2012-04-10 Thread Adam Back
Well the length extension is not fully flexible. ie you get SHA1( msg ) which translates into "msg-blocks || " which is then fed to SHA1-transform, and the IV is some magic values. So the length extension is if you start with a hash that presumably you dont know all the msg-blocks. h1 = SHA1(

Re: [cryptography] data integrity: secret key vs. non-secret verifier; and: are we winning? (was: “On the limits of the use cases for authenticated encryption”)

2012-04-26 Thread Adam Back
I think the separate integrity tag is more general, flexible and more secure where the flexibility is needed. Tahoe has more complex requirements and hence needds to make use of a separate integrity tag. I guess in general it is going to be more general, flexible if there are separate keys (incl

Re: [cryptography] data integrity: secret key vs. non-secret verifier; and: are we winning? (was: “On the limits of the use cases for authenticated encryption”)

2012-04-26 Thread Adam Back
d up with a compromised design in both dimensions. Adam On Thu, Apr 26, 2012 at 11:55:27AM +0200, Adam Back wrote: I think the separate integrity tag is more general, flexible and more secure where the flexibility is needed. Tahoe has more complex requirements and hence needds to make use of a sepa

Re: [cryptography] Bitcoin-mining Botnets observed in the wild? (was: Re: Bitcoin in endgame

2012-05-11 Thread Adam Back
Strikes me 12TH/sec is not actually very much computation? http://bitcoinwatch.com/ also gives network hashrate at 12.4 TH/sec. But a single normally clocked (925Mhz) AMD 7970 based graphics card which has 2048 cores is claimed to provide 555MH/sec. https://en.bitcoin.it/wiki/Mining_hardware

Re: [cryptography] Bitcoin-mining Botnets observed in the wild? (was: Re: Bitcoin in endgame

2012-05-11 Thread Adam Back
o do to catchup with biologial computers in efficiency and horsepower. Adam On Sat, May 12, 2012 at 01:22:44AM +0200, Adam Back wrote: Strikes me 12TH/sec is not actually very much computation? http://bitcoinwatch.com/ also gives network hashrate at 12.4 TH/sec. But a single normally clocked (92

Re: [cryptography] Master Password

2012-05-31 Thread Adam Back
Reminds me of Feb 2003 - "Moderately Hard, Memory-bound Functions" NDSS 03, Martin Abadi, Mike Burrows, Mark Manasse, and Ted Wobber. (cached at) http://hashcash.org/papers/memory-bound-ndss.pdf By microsoft research, but then when exchange and oulook added a computational cost function, for ha

Re: [cryptography] Can there be a cryptographic "dead man switch"?

2012-09-06 Thread Adam Back
And make sure there are multiple internet connections to the hidden servers. Adam On Thu, Sep 06, 2012 at 03:40:23AM +0100, StealthMonger wrote: Good argument. Thanks. It makes Natanael's solution, or some variant of it, all the more appealing. Keep Natanael's servers secret, such as on sca

Re: [cryptography] [zfs] SHA-3 winner announced

2012-10-03 Thread Adam Back
(comment to Saso's email forwarded by Eugen): Well I think it would be fairer to say SHA-3 was initiatied more in the direction of improving on the state of art in security of hash algorithms given that SHA1 was demonstrated to have alarming short-falls, and given that the only remaining FIPS alt

Re: [cryptography] ZFS dedup? hashes (Re: [zfs] SHA-3 winner announced)

2012-10-04 Thread Adam Back
On Thu, Oct 04, 2012 at 11:47:08AM +0200, Jim Klimov wrote: [decrypting or confirming encrypted or ACLed documents via dedup] eg say a form letter where the only blanks to fill in are the name (known suspected) and a figure (<1,000,000 possible values). What sort of attack do you suggest? That

Re: [cryptography] Questions about crypto in Oracle TDE

2012-11-08 Thread Adam Back
I'd guess they mean salt is pre-pended to the plaintext and then presume eg then salt + plaintext encrypted with AES in CBC mode with a zero IV. That would be approximately equivalent to encrypting with a random IV (presuming the salt, IV and cipher block are all the same size) because CBC-Enc(

Re: [cryptography] Questions about crypto in Oracle TDE

2012-11-09 Thread Adam Back
On Thu, Nov 08, 2012 at 03:22:24PM -0800, Morlock Elloi wrote: However, if you use asymmetric crypto (say, 1024 or 2048-bit RSA), give only public key(s) to encrypting flows, and reserve the secret key(s) for modules that need the actual plaintext access (a rare situation in practice), then: Do

Re: [cryptography] Questions about crypto in Oracle TDE

2012-11-09 Thread Adam Back
On Fri, Nov 09, 2012 at 09:36:41AM -0800, Morlock Elloi wrote: As long as each encryption of the same plaintext yields the same ciphertext, indexing works. However, the space is tight - plaintext size is close to the cipher capacity. is there an inferred "so we have no space to pad the plainte

Re: [cryptography] Why using asymmetric crypto like symmetric crypto isn't secure

2012-11-11 Thread Adam Back
(I copied Hans-Joachim Knobloch onto the thread) Weiner is talking about small secret exponents (small d), no one does that. They choose smallish prime e, with low hamming weight (for encryption/signature verification efficiency) like 65537 (10001h) and get a random d, which will by definition

[cryptography] current limits of proving MITM (Re: Gmail and SSL)

2012-12-16 Thread Adam Back
(note the tidy email editing, Ben, and other blind top posters to massive email threads :) See inlne. On Sun, Dec 16, 2012 at 10:52:37AM +0300, ianG wrote: [...] we want to prove that a certificate found in an MITM was in the chain or not. But (4) we already have that, in a non-cryptographic w

Re: [cryptography] ElGamal Encryption and Signature: Key Generation Requirements?

2012-12-17 Thread Adam Back
Those are Lim-Lee primes where p=2n+1 where a B-smooth composite (meaning n = p0*p1*...*pk where each p0 is f size < B bits. http://www.gnupg.org/documentation/manuals/gcrypt/Prime_002dNumber_002dGenerator-Subsystem-Architecture.html So if Crypto++ is testing if the q from p=2q+1 is prime, its r

Re: [cryptography] ElGamal Encryption and Signature: Key Generation Requirements?

2012-12-18 Thread Adam Back
am On Tue, Dec 18, 2012 at 01:15:05AM +0100, Adam Back wrote: Those are Lim-Lee primes where p=2n+1 where a B-smooth composite (meaning n = p0*p1*...*pk where each p0 is f size < B bits. http://www.gnupg.org/documentation/manuals/gcrypt/Prime_002dNumber_002dGenerator-Subsystem-Architecture.ht

Re: [cryptography] ElGamal Encryption and Signature: Key Generation Requirements?

2012-12-18 Thread Adam Back
Well one reason people like Lim-Lee primes is its much faster to generate them. That is because of prime density being lower for strong primes, at the sizes of p & q for p=2q+1 and you need to screen both p & q for primeness. With Lim-Lee as you maybe saw in the paper you just generate a few ext

Re: [cryptography] ElGamal Encryption and Signature: Key Generation Requirements?

2012-12-19 Thread Adam Back
they are laughing so hard. Jeff On Tue, Dec 18, 2012 at 8:29 PM, Adam Back wrote: Well one reason people like Lim-Lee primes is its much faster to generate them. That is because of prime density being lower for strong primes, at the sizes of p & q for p=2q+1 and you need to screen both p &

[cryptography] fragilities of CTR vs CBC (Re: Tigerspike claims world first with Karacell for mobile security)

2012-12-27 Thread Adam Back
I think you could say CTR mode is fragile against counter reuse exposing plaintext pair XORs, but CBC is also somewhat fragile against IV reuse, forming an ECB code book around the set of same IV messages. CBC itself has other issues eg using non-repeating (but non-random) IVs, for example using

Re: [cryptography] Why anon-DH is less damaging than current browser PKI (a rant in five paragraphs)

2013-01-08 Thread Adam Back
IMO it is very bad practice that a number of banks use a domain that does not match the main domain and brand for the login. I have seen multiple examples of what James mentioned. For example www.natwest.com it does not redirect to HTTPS, further when you click on login, it goes to https://www.n

Re: [cryptography] yet another certificate MITM attack

2013-01-11 Thread Adam Back
For http there is a mechanism for cache security as this is an issue that does come up (you do not want to cache security information or responses with security information in them, eg cookies or information related to one user and then have the proxy cache accidentally send that to a different us

[cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-16 Thread Adam Back
There was a subthread in this huge PKI-is-failing and doesnt solve phishing thread looking at what might solve phishing (modulo engineering and deployment issues). To summarize Ian & Ben mentioned and I add a few: - client side certificates - password managers - browser auth - TPM to make creden

Re: [cryptography] Bonding or Insuring of CAs?

2013-01-25 Thread Adam Back
I had the impression this list and its predecssor moderated (too heavily IMO) by Perry were primarily about applied crypto. So you get to tolerate a bit of applied crypto security stuff if you're interested in crypto theory and vice versa. Seems healthy to me (cross informs both camps). In term

[cryptography] blinding to protect against timing-attacks on RSA sigs (Re: OAEP for RSA signatures?)

2013-01-27 Thread Adam Back
The RSA private key timing attack is much more likely than on padding because the cost is so much higher. Bleichenbacher like adaptive attacks are not so much timing as error code attacks (app is too chatty about whether padding was well formed afte decryption), so thats a separate issue. For RS

Re: [cryptography] openssl on git

2013-01-28 Thread Adam Back
You know other source control systems, and presumably git also, have an excludes list which can contain wildcards. It comes prepopulated with eg *.o - as you probably dont want to check them in. I think you could classify this as a git bug (or more probably a mistake in how github are using/conf

[cryptography] ZKPs and other stuff at Zero Knowledge Systems (Re: "Zero knowledge" as a term for end-to-end encryption)

2013-02-13 Thread Adam Back
I dont think its too bad, its fairly intuitive and related english meaning also. At zero-knowlege we had a precedent of the same use: we used it as an intentional pun that we had "zero-knowledge" about our customers, and in actuality in one of the later versions we actually had a ZKP (to do with

Re: [cryptography] Bitmessage

2013-02-16 Thread Adam Back
With no criticism to the idea and motivation there are similarities with having a reply-to of a newsgroup such as alt.anonymous.messages, which is used as a more secure alternative to reply blocks. To pickup those messages anonymously you'd ideally need to be able to unobservably download newsgro

Re: [cryptography] Bitmessage

2013-02-20 Thread Adam Back
Seems to me neither of you read the reference I gave: I (Adam) wrote: It is tricky to get forward secrecy for store-and-forard messaging [2], but perhaps you could incorporate rekeying into your protocol in some convenient way. ... [2] http://cypherspace.org/adam/nifs/ Not impossible just not-

Re: [cryptography] Interesting Webcrypto question

2013-03-03 Thread Adam Back
Unless you're selling SSL MITM boxes to tyrants & dictators, then of course its alright ;) Well maybe they'll turn a blind eye if the West is propping up that particular tyrant until they flip flop. Anyway wasnt all that US export of crypto code nonsense tidied up a decade or so ago? PRZ did not

Re: [cryptography] Interesting Webcrypto question

2013-03-03 Thread Adam Back
The realism of export restricting open source software is utterly ludicrous. Any self-declaration click-through someone might implement can be clicked through by anyone, from anywhere, and I presume someone from an embargoed country is more worried about their own countries laws than US laws, to

[cryptography] msft skype IM snooping stats & PGP/X509 in IM?? (Re: why did OTR succeed in IM?)

2013-03-23 Thread Adam Back
Was there anyone trying to use OpenPGP and/or X.509 in IM? I mean I know many IM protocols support SSL which itself uses X.509, but that doesnt really meaningfully encrypt the messages in a privacy sense as they flow in the plaintext through chat server with that model. btw is anyone noticing th

Re: [cryptography] msft skype IM snooping stats & PGP/X509 in IM?? (Re: why did OTR succeed in IM?)

2013-03-24 Thread Adam Back
Ian wrote: Are we saying then that the threat on the servers has proven so small that in practice nobody's bothered to push a persistent key mechanism? Or have I got this wrong, and the clients are doing p2p exchange of their ephemeral keys, thus dispersing the risk? Its been a while since I

Re: [cryptography] Cypherpunks mailing list

2013-03-25 Thread Adam Back
Yeah but that is basically zero traffic, and I suspect in large part because its a silly domain that people who dislike inviting their addition to a watch-list will avoid. Maybe someone with a more neutral domain could try it - or a cypherpunks.* domain if they have a listserv handy. Adam On Mo

Re: [cryptography] Cypherpunks mailing list

2013-03-25 Thread Adam Back
On Mon, Mar 25, 2013 at 05:13:57PM +0100, Moritz wrote: On 25.03.2013 09:25, Adam Back wrote: because its a silly domain that people who dislike inviting their addition to a watch-list will avoid. Isn't exactly that a nice property of a "cypherpunks" list? No it is not,

Re: [cryptography] Cypherpunks mailing list

2013-03-25 Thread Adam Back
oint. But my point actually was b...@al-qaeda.net??? Come on that is watch list bait and an invitation NOT to join list blah, whatever it is about. Adam On Mon, Mar 25, 2013 at 06:18:14PM +0100, Eugen Leitl wrote: On Mon, Mar 25, 2013 at 05:50:18PM +0100, Adam Back wrote: Isn't exac

Re: [cryptography] Here's What Law Enforcement Can Recover From A Seized iPhone

2013-03-29 Thread Adam Back
I dont buy this "it wouldnt be cool so a consumer company wouldnt do it" argument. Seemingly companies are very susceptible to law enforcement, legal and government influence and pressure. I guess people are forgetting the hushmail episode. And the CA episodes. And much more recent microsoft s

Re: [cryptography] an untraceability extension to Bitcoin using a combination of digital commitments, one-way accumulators and zero-knowledge proofs,

2013-04-13 Thread Adam Back
Also without having read the article, but did read the blog post by one of the authors as Ian G said zerocoin appears to provide payment privacy, and public auditability while retaining distributed setting. However payment publicly auditable payment privacy comes from ZKP of non-set membership (f

  1   2   >