Cryptography-Digest Digest #880

2000-05-28 Thread Digestifier

Cryptography-Digest Digest #880, Volume #11  Sun, 28 May 00 17:13:00 EDT

Contents:
  Re: list of prime numbers (Jerry Coffin)
  TC1a (oops) (tomstd)
  Re: RIP Bill 3rd Reading in Parliament TODAY 8th May (Adrian Kennard)
  On dynamic random selection of encryption algorithms (Mok-Kong Shen)
  Re: Hill's algorithm (Mok-Kong Shen)
  Re: Another sci.crypt Cipher (David A. Wagner)
  Re: Plain simple (?) question (Alain CULOS)
  Re: Crypto patentability (zapzing)
  Re: Traffic Analysis Capabilities (zapzing)
  Re: PGP wipe how good is it versus hardware recovery of HD? (zapzing)
  Re: Retail distributors of DES chips? (zapzing)
  Re: No-Key Encryption (zapzing)
  My simple cipher ([EMAIL PROTECTED])
  Re: No-Key Encryption (Guy Macon)
  Re: PGP wipe how good is it versus hardware recovery of HD? (Guy Macon)
  Re: Traffic Analysis Capabilities (Guy Macon)
  Re: Traffic Analysis Capabilities (Mok-Kong Shen)
  Re: No-Key Encryption (Mok-Kong Shen)



From: Jerry Coffin [EMAIL PROTECTED]
Subject: Re: list of prime numbers
Date: Sun, 28 May 2000 11:16:54 -0600

In article [EMAIL PROTECTED], 
[EMAIL PROTECTED] says...

[ ... ]

 If one has a large number (say 150 digits), what are the ways to try
 and break this up into its factors?  Where does one start?  I think
 that there can only be a limited list of possible prime numbers which
 will actually (when multiplied) come up with the correct public
 modulus.

Yes, it's _very_ limited -- in fact it's limited to exactly the same 
pair of numbers that were originally multiplied to produce the number 
to start with.

Unfortunately, while those two or three (or whatever) numbers are 
drawn from a set that's limited in the theoretical sense (i.e. it's 
not an infinite set) it's set so many that a list of all the 
possibilties would be FAR too large to store -- even if every atom of 
the earth could store a number and you could convert all the matter 
in the earthh into such storage, you'd still be WAY short of storing 
the whole list.  Change "earth" to "solar system" and you're not much 
closer.  Change it to "milky way galaxy" and you're still only able 
to store a TINY fraction of the list...

-- 
Later,
Jerry.
 
The universe is a figment of its own imagination.

--

Subject: TC1a (oops)
From: tomstd [EMAIL PROTECTED]
Date: Sun, 28 May 2000 10:17:22 -0700

I found a problem with the original TC1a permutation that bit 29
goes to bit 29.  I found another permutation with the following
diff chars.  Tommorow I will write a second paper on TC1a
including marks findings on the original TC1.

If anyone has hints onto linear cryptanalysis I would appreciate
it...

It can be found at http://www.tomstdenis.com/tc1ref.c

16r: none

15r: 2^-63.66, 19[0] - 01[3] p=1/64, 01[3] - 04[0] p=1/64, 1d
[0] - 01[3], p=6/256

14r: 2^-62.00, 02[0] - 05[2] p=1/128, 05[2] - 02[0] p=1/128

14r: 2^-58.00, 12[0] - 01[2] p=1/64,  01[2] - 12[0] p=1/128

14r: 2^-57.66, 19[0] - 01[3] p=1/64,  01[3] - 04[0] p=1/64, 1d
[0] - 01[3] p=6/256

13r: 2^-52.00, 12[0] - 01[2] p=1/64,  01[2] - 12[0] p=1/128



* Sent from RemarQ http://www.remarq.com The Internet's Discussion Network *
The fastest and easiest way to search and participate in Usenet - Free!


--

From: Adrian Kennard [EMAIL PROTECTED]
Crossposted-To: 
uk.media.newspapers,uk.legal,alt.security.pgp,alt.privacy,uk.politics.parliament,uk.politics.crime,talk.politics.crypto,alt.ph.uk,alt.conspiracy.spy,alt.politics.uk,uk.telecom
Subject: Re: RIP Bill 3rd Reading in Parliament TODAY 8th May
Date: Sun, 28 May 2000 18:21:52 +0100

A_Customer_at_an_easyEverything_Cybercafe wrote:
 
 On Mon, 8 May 2000 14:31:20 +0100, "NoSpam" [EMAIL PROTECTED]
 wrote:
 
 plans were already far advanced for a law that would stop ILOVEYOU ever
 happening again. Yes, it's that darn RIP bill, still struggling to find
 supporters in the real world"
 
 If they want to stop I Love you virii, why dont they just get
 everybody to use a secure mail reader? surely it wouldnt cost them a
 lot to switch to somerthing secure, like pine, or any other *nix mail
 reader, or even some windows readers are not too bad.  Why spent money
 on a bill that restricts human rights when you could have abetter
 solution for all for free?

I though there were already laws against the ILOVEYOU virus - the
Computer Misue Act for one. I cant see how any law can "stop it
happening", they can simply help ensure the guilty party is punished.

-- 
 _Andrews  Arnold Ltd, 01344 400 000 http://aa.nu/
(_) _| _ . _  _   Professional Voice and Data Systems for Business.
( )(_|(  |(_|| )  Gold Certified Alchemists, BT ISDN/ADSL Resellers

--

From: Mok-Kong Shen [EMAIL PROTECTED]
Subject: On dynamic random selection of encryption algorithms
Date: Sun, 28 May 2000 20:03:46 +0

Cryptography-Digest Digest #880

2000-01-10 Thread Digestifier

Cryptography-Digest Digest #880, Volume #10  Mon, 10 Jan 00 19:13:01 EST

Contents:
  Re: "1:1 adaptive huffman compression" doesn't work (SCOTT19U.ZIP_GUY)
  Re: Questions about message digest functions ([EMAIL PROTECTED])
  Re: compression  encryption (SCOTT19U.ZIP_GUY)
  Re: "1:1 adaptive huffman compression" doesn't work ("Douglas A. Gwyn")
  Re: Is there a sci.crypt FAQ? ("Douglas A. Gwyn")
  Re: AES  satellite example ("Trevor Jackson, III")
  Re: Simple Encryption ... (Paul Koning)
  Re: Intel 810 chipset Random Number Generator (Paul Koning)
  Re: Intel 810 chipset Random Number Generator ("Trevor Jackson, III")
  Re: Intel 810 chipset Random Number Generator ("Trevor Jackson, III")
  Re: "1:1 adaptive huffman compression" doesn't work ("Gary")



From: [EMAIL PROTECTED] (SCOTT19U.ZIP_GUY)
Subject: Re: "1:1 adaptive huffman compression" doesn't work
Date: Mon, 10 Jan 2000 22:34:48 GMT

In article [EMAIL PROTECTED], Mok-Kong Shen [EMAIL PROTECTED] 
wrote:
Tim Tyler wrote:
 

 One idea behind such a scheme is essentially that if the EOF occurs while
 the decompressor is in the middle of a symbol, it *knows* that this can
 only happen if the decompressor chopped of a tail of zeros.  This tail of
 zeros can be unambiguously reconstructed *provided* the file does not end
 with any all-zero Huffman symbols - and this case can be avoided fairly
 simply.

Excuse me, if I am arguing based on wrong knowledge (I haven't followed
the stuff for quite a while and perhaps have forgotten a lot). What 
if the analyst decrypts with a wrong key which produces a file that 
has at the end a sufficiently long sequence of zeros?

M. K. Shen

  go ahead test h2com and h2unc with a file of zeroes 



David A. Scott
--

SCOTT19U.ZIP NOW AVAILABLE WORLD WIDE
http://www.jim.com/jamesd/Kong/scott19u.zip

Scott famous encryption website NOT FOR WIMPS
http://members.xoom.com/ecil/index.htm

Scott rejected paper for the ACM
http://members.xoom.com/ecil/dspaper.htm

Scott famous Compression Page WIMPS allowed
http://members.xoom.com/ecil/compress.htm

**NOTE EMAIL address is for SPAMERS***

I leave you with this final thought from President Bill Clinton:

   "The road to tyranny, we must never forget, begins with the destruction of the 
truth." 

--

From: [EMAIL PROTECTED]
Subject: Re: Questions about message digest functions
Date: Mon, 10 Jan 2000 22:23:46 GMT

Tim Tyler I wrote:

 [is building a secure, one-way pseudo-random permutation possible?]
 To quote from Section 18.12 of Schneier's "Applied
Cryptography":

 ``It is possible to use a public-key encryption algorithm in a block
   chaining mode as a one-way hash function.  If you then throw away
the
   private key, breaking the hash would be as difficult as reading the
   message without the private key.''

 This construction appears to work, and when block
 size, hash size and message size are all equal, it
 provides a secure bijective one-way hash.

Now look at how the time to break it compares with
hashes based on PRF's.

--Bryan


Sent via Deja.com http://www.deja.com/
Before you buy.

--

From: [EMAIL PROTECTED] (SCOTT19U.ZIP_GUY)
Subject: Re: compression  encryption
Date: Mon, 10 Jan 2000 22:53:30 GMT

In article 85baeq$h7o$[EMAIL PROTECTED], Kenneth Almquist [EMAIL PROTECTED] 
wrote:
Kenneth Almquist [EMAIL PROTECTED] wrote:
 Tim Tyler [EMAIL PROTECTED] wrote:
: Compressing using a nonbijective algorithm and then encrypting twice
: may be faster than compressing using a bijective algorithm and then
: compressing once.

 Multiple encryption with independent algorithms and bijective
 compression produce different types of security benefit.

The security benefit in both cases is that the attacker has less
information about the input to the encryption algorithm.  (In the
case of double encryption, I am referring to the input to the
second encryption.)

: That is because some of the compression algorithms
: which provide the best combination of speed and compression ratio
: (such as the one used by gzip) are not bijective.

 Bijective compression has only just been invented.  The current
 situation /should/ eventually reverse - since making a compression
 system bijective demonstrably makes optimal use of the range of the
 compressor.

The algorithms with the best compression ratios are non-bijective only
because of redundancies between the contents of the compressor output
and the length of the compressor output.  Since the length of the
compressor output can be represented in log_2(N) bits, this redundancy
wastes at *most* log_2(N) bits.
No the above is not the reason since it is possible to map bijective from 
bits streams that could come from a compressor to any mulitle of bytes.
take any

Cryptography-Digest Digest #880

1999-07-14 Thread Digestifier

Cryptography-Digest Digest #880, Volume #9   Wed, 14 Jul 99 10:13:05 EDT

Contents:
  Re: Funny News (wtshaw)
  Re: wincrypt (Sampo Pasanen)
  Re: Fractal encryption (Jerry Coffin)
  Re: What is a fractal? (Sampo Pasanen)
  Re: I wonder why he wrote it that way. ("JOE")
  Re: Benfords law for factoring primes? (Dean Povey)
  Re: How Big is a Byte? (was: New Encryption Product!) (Rob Warnock)
  Re: What is a fractal? (John Bailey)
  Re: Funny News (James Andrews)
  Re: How Big is a Byte? (was: New Encryption Product!) ([EMAIL PROTECTED])
  Re: Kryptos article (Roger Fleming)
  Re: How Big is a Byte? (was: New Encryption Product!) (Jerry Leichter)
  Re: Fractal encryption (Mok-Kong Shen)
  Re: Is Stenography legal? (Patrick Juola)
  Re: How Big is a Byte? (was: New Encryption Product!) 
([EMAIL PROTECTED])



From: [EMAIL PROTECTED] (wtshaw)
Subject: Re: Funny News
Date: Wed, 14 Jul 1999 00:25:53 -0600

In article [EMAIL PROTECTED], John Myre [EMAIL PROTECTED] wrote:

 [EMAIL PROTECTED] wrote:
  

  My question is (this is an open question), What good do these
  regulations ACTUALLY provide?  If a criminal breaks the law won't logic
  dictate they won't follow this law as well?
  
 
 The specific argument that control is useless because criminals
 will ignore regulations is false logic.  The gulf between "not
 100% effective" and "useless" is quite wide.  Making something
 illegal will decrease its use: at least *some* criminals will
 find it too hard, or too expensive, or too confusing, or just
 won't use it correctly.
 
The problem with too many or too complicated regulations is that they are
apt to be ignored by non-criminals as well because it is not reasonable to
even try to understand the latest bureaucratic whims.  

Most people except those in Washington seem to know what the country is
about, and can usually make rational judgements based on their generalized
understandings.  Whatever comes out to the contrary is, as I said, merely
apt to be ignored.  

To keep from looking like complete idiots all of the time, best that those
inside the beltway pay attention to the ineffectiveness of government by
midnight edict and hollow sounding laws backed by votes all too often
bought and bartered in acts of unashamed passion and greed.
-- 
Rest sometimes allows you to find new things to worry about but should give you the 
patience to do something about them.

--

From: Sampo Pasanen [EMAIL PROTECTED]
Subject: Re: wincrypt
Date: Wed, 14 Jul 1999 11:06:00 +0300

Works for me...

[EMAIL PROTECTED] wrote:

 In article 7mgef1$bc0$[EMAIL PROTECTED],
   "Terry  Mechan" [EMAIL PROTECTED] wrote:
  check software on
 
  http://www.tmechan.freeserve.co.uk

 Link doesn't work for me.. Is it right or is the server just slow?

 Tom


--

From: [EMAIL PROTECTED] (Jerry Coffin)
Subject: Re: Fractal encryption
Date: Wed, 14 Jul 1999 01:42:14 -0600

In article 7mg2gi$rj5$[EMAIL PROTECTED], [EMAIL PROTECTED] says...

[ ... ] 

 One example is R. Crandall's use of the 3-body problem. One chooses
 a 3-body problem by specifying (say) the angular momentum vectors and
 masses of 2 of the bodies.  The angular momentum for the 3rd body is
 used as a private key. One can encode the message in the mass of the
 third body.  You then crank the system forward for some time period
 and use the result as the encrypted text.

This seems to me to have one basic problem when it comes to 
portability.  One of the basic properties of this (like most fractal-
related ones) is that extremely minor errors anywhere in the 
calculations will lead to drastic errors later one.  I suspect that 
given the vagaries of floating-point hardware that otherwise trivial 
differences between hardware could easily lead to problems.  For 
example encoding a message on, say, an Intel machine and then 
attempting to decode it on, say, an UltraSPARC could lead to 
completely incorrect results.

Obviously, it's possible to work around this, but I strongly suspect 
that by the time that's done, it would take a system that's already 
slow and render it something like a couple of orders of magnitude 
slower still in at least some cases.

--

From: Sampo Pasanen [EMAIL PROTECTED]
Subject: Re: What is a fractal?
Date: Wed, 14 Jul 1999 10:51:12 +0300

I don't know much about fractal's, but they are connected with Chaos
theory. The pictures (that you usually think of when talking about
fractals) represent a mathematical state of a function(s?) and the
colors indicate values (if I'm not totally wrong).

But here are some good links. The first link points to FAQ-pages where
you can find more information about the definitions and the second link
points to Yahoo fractal links.

http://library.advanced.org/3703/

[EMAIL PROTECTED] wrote:

 Following Bob Silvermans suggestion