Cryptography-Digest Digest #365

2001-05-16 Thread Digestifier

Cryptography-Digest Digest #365, Volume #14  Wed, 16 May 01 11:13:01 EDT

Contents:
  Re: ON-topic - UK crime statistics (was Re: Best, Strongest Algorithm) (Trevor L. 
Jackson, III)
  Re: Evidence Eliminator works great. Beware anybody who claims it doesn't work 
(propaganda) (Paul Crowley)
  Re: ON-topic - UK crime statistics (was Re: Best, Strongest Algorithm) (Richard 
Herring)
  Re: Newbie Question: Crytography - Unlimited Inputs/Outputs? (SCOTT19U.ZIP_GUY)
  Re: Karnaugh Maps (Pascal Junod)
  RE: Karnaugh Maps (Alexis Machado)
  Re: ON-topic - UK crime statistics (was Re: Best, Strongest Algorithm) 
(SCOTT19U.ZIP_GUY)
  Re: ON-topic - UK crime statistics (was Re: Best, Strongest Algorithm) 
(SCOTT19U.ZIP_GUY)
  How to develop a 64-bit key (ritesh_swd)
  Re: Karnaugh Maps (Sam Simpson)
  Re: Are low exponents a problem with RSA? (DJohn37050)
  Re: taking your PC in for repair? WARNING: What will they find? (Shaun Hollingworth)
  Re: request for encryption software suggestions (Anton Stiglic)
  Re: Karnaugh Maps (jlcooke)
  Re: How to develop a 64-bit key (jlcooke)
  Re: Probablistic Algorithms For Square Roots of QRs in Z/n (Anton Stiglic)
  Re: Karnaugh Maps (jlcooke)
  How can I see the symmetric enncryption keysize in SSL? (no_carrier)
  Any SEC free program for Visa? (no_carrier)
  America Civil War Private Shorthand (Dave Smith)
  Re: function decomposition (jlcooke)
  Re: function decomposition (jlcooke)
  Re: MISTY -- no simple truncated difs (jlcooke)
  Re: function decomposition (Mark Wooding)
  Re: Karnaugh Maps (Pascal Junod)



From: Trevor L. Jackson, III [EMAIL PROTECTED]
Subject: Re: ON-topic - UK crime statistics (was Re: Best, Strongest Algorithm)
Date: Wed, 16 May 2001 12:37:54 GMT

Tim Tyler wrote:

 SCOTT19U.ZIP_GUY [EMAIL PROTECTED] wrote:

 : No wonder violent crime is up in the UK you can't shoot
 : the bastards that break into you own house. [...]

 I believe shooting someone for breaking and entering would
 itself be regarded as a violent crime in the UK.

And in the U.S.  BE, while a violent crime, does not rise to the level
of a threat of death or great bodily harm.  The only actions that
justify a potentially lethal response are rape, arson, a lethal threat
and their respective attempts.



--

Crossposted-To: 
alt.privacy,alt.security.pgp,alt.security.scramdisk,alt.privacy.anon-server
Subject: Re: Evidence Eliminator works great. Beware anybody who claims it doesn't 
work (propaganda)
From: Paul Crowley [EMAIL PROTECTED]
Date: Wed, 16 May 2001 12:39:32 GMT

EE Support [EMAIL PROTECTED] writes:
 By now you will have witnessed the mass hysteria about Evidence Eliminator.

As regular readers of some of these groups probably know, Evidence
Eliminator doesn't work, which is why they spam newsgroups.  The
report they're keen to badmouth can be found here:

http://badtux.org/eric/editorial/scumbags.html

I know Eric because he was a thoughtful contributor to the Appraising
Microsoft mailing list way back.
-- 
  __  Paul Crowley
\/ o\ [EMAIL PROTECTED]
/\__/ http://www.cluefactory.org.uk/paul/
Conservation of angular momentum makes the world go around - John Clark

--

From: [EMAIL PROTECTED] (Richard Herring)
Subject: Re: ON-topic - UK crime statistics (was Re: Best, Strongest Algorithm)
Date: 16 May 2001 12:14:38 GMT
Reply-To: [EMAIL PROTECTED]

In article [EMAIL PROTECTED], Douglas A. Gwyn ([EMAIL PROTECTED]) wrote:
 SCOTT19U.ZIP_GUY wrote:
  ...  No wonder violent crime is up in the UK you
  can't shoot the bastards that break into you own house.

 Note: You don't have to actually shoot them; it's the fear
 of being shot that has deterred many potential home invasions.

If they didn't take place, how do you know?

In any case, even quite stupid thieves usually have the wit to 
target empty houses.

-- 
Richard Herring   |  [EMAIL PROTECTED]

--

From: [EMAIL PROTECTED] (SCOTT19U.ZIP_GUY)
Subject: Re: Newbie Question: Crytography - Unlimited Inputs/Outputs?
Date: 16 May 2001 12:47:51 GMT

[EMAIL PROTECTED] (news.singnet.com.sg) wrote in
9dt90f$jk3$[EMAIL PROTECTED]: 

BlankHi, I am just getting into the world of cryptography and would like
to ask a question. If it is too commonly known then please direct me to
a website link/other resource.

I read/heard somewhere that given an encryption system where the tester
is allowed an unlimited number of inputs and outputs, that the system
itself will always be possible to break. Is this true?



  Im theroy if you allow an umlimited amount of inputs and there availabe
outputs. you can eventrully get the plaintext for ciphertext. Which
is the solution your looking for.

   Note the above all depends on using a fixed key. But if you have
an unlimited number of inputs and test every key then with a properly
designed crypto system there will be even with the random data

Cryptography-Digest Digest #365

2000-12-19 Thread Digestifier

Cryptography-Digest Digest #365, Volume #13  Tue, 19 Dec 00 16:13:00 EST

Contents:
  Re: use of position of characters for encryption (Simon Johnson)
  Re: In today´s paper I read how Cuban intelligence bosses are using shortwaves and 
the Morse code to communicate with their intelligence agents in Miami  interesting 
.. when I was in California (I think) I got some strange messages to my head .. 
(Juergen Nieveler)
  Re: In today´s paper I read how Cuban intelligence  bosses are using shortwaves and 
the Morse code to communicate with their  intelligence agents in Miami  
interesting .. when I was in  California (I think) I got some strange messages to my 
head .. (Kirby Urner)
  Re: Why primes? ("Jesper Stocholm")
  Steganography using text as carrier ([EMAIL PROTECTED])
  Vendor software using CPU spin rate to generate random numbers ("Jeffrey W. Baker")
  Re: does CA need the proof of acceptance of key binding ? (Mok-Kong Shen)
  Re: In today paper I read how Cuban intelligence  (Keith)
  Re: Steganography using text as carrier (Mok-Kong Shen)
  Re: In =?iso-8859-1?Q?today=B4s?= paper I read how Cuban intelligence   (Chumkil)
  Re: Vendor software using CPU spin rate to generate random numbers (Steve Portly)
  Re: Vendor software using CPU spin rate to generate random numbers 
([EMAIL PROTECTED])
  SMS security over various networks? (Chris Kantarjiev)
  Re: Why primes? (Richard Heathfield)
  Re: Q: Result of an old thread? (Bryan Olson)
  Re: Why primes? (Jerry Coffin)
  Re: Possibly another Encryption method - any thoughts ? (Simon Johnson)
  Re: Q: Result of an old thread? (Mok-Kong Shen)
  Re: Vendor software using CPU spin rate to generate random numbers ("Jeffrey W. 
Baker")
  Re: In today´s paper I read how Cuban intelligence   bosses are using shortwaves and 
the Morse code to communicate with their  intelligence agents in Miami  
interesting .. when I was in   California (I think) I got some strange messages to my 
head .. (Kirby Urner)



From: Simon Johnson [EMAIL PROTECTED]
Subject: Re: use of position of characters for encryption
Date: Tue, 19 Dec 2000 15:57:35 GMT

In article [EMAIL PROTECTED],
  [EMAIL PROTECTED] wrote:
 Would it be better or worse to use a system in
 which the ciphertext is created based on the
 location of a particular character?

This isn't a bad idea, the only negative effect would be it would
increase the complexity of implementation, and the end cipher would run
slower. Though, if your cautious with what your doing, then the
resultant cipher should be more secure.

 For example:
 f(x) = (position(x) + x) * key
 position(x) = x'th character in plaintext.
 x = character

 I think that implementing this would
 destroy  the ability to use a type of trans-
 position, but which one is better?

Well, this algorithm here isn't very clever. F(x) size is partly
determined by position(x), it is clear this would result in cipher-text
expantion. Not only this, but if this where used to directly encipher
it would be very weak indeed. It would require only two cipher-text's
to break:
x0= first plain-text, f(x0) = First cipher-text
x1 = sencond plain-text, f(x0) = Second cipher-text

we know the key's are equal:

F(x0) = (position(x0) + x0) * key
F(x1) = (position(x1) + x1) * key

:. F(x1)/(position(x2) + x1) = F(x0)/(position(x0) + x0)

By resubstitution you can find the key.

This doesn't mean your original idea is incorrect, you just don't do it
that way.

Simon.
--
Hi, i'm the signuture virus,
help me spread by copying me into Signiture File


Sent via Deja.com
http://www.deja.com/

--

From: [EMAIL PROTECTED] (Juergen Nieveler)
Crossposted-To: alt.2600,alt.security,comp.security
Subject: Re: In today´s paper I read how Cuban intelligence bosses are using 
shortwaves and the Morse code to communicate with their intelligence agents in Miami 
 interesting .. when I was in California (I think) I got some strange messages to 
my head ..
Date: 19 Dec 2000 16:10:21 GMT

Markku J. Saarelainen [EMAIL PROTECTED] wrote:

It was the Morse code for "SOS" ... and I understood it, but did not
really know what was going on, but it was very very strange, because I
had not had similar experiences before .. but in the next news that I
read, I read about the accident of the nuclear submarine Kursk. So I
realized something ...

Uh... you did notice that the Kursk was 100m deep UNDER water when it had 
the accident?

And that you cannot transmit radio signals from that depth?

F'up to alt.security, because it would be way off-topic for the other 
groups...

-- 
Juergen Nieveler
Support the ban of Dihydrogen Monoxide: http://www.dhmo.org/
"The people united can never be ignited!"- Sgt. Colon, Ankh-Morpork Watch
PGP-Key available under www.netcologne.de/~nc-nievelju/

--

From: Kirby Urner [EMAI

Cryptography-Digest Digest #365

2000-08-06 Thread Digestifier

Cryptography-Digest Digest #365, Volume #12   Sun, 6 Aug 00 12:13:00 EDT

Contents:
  Re: New William Friedman Crypto Patent (filed in 1933) ("Douglas A. Gwyn")
  Re: Q: CD ("Douglas A. Gwyn")
  Re: Hashing Algorithms (Mack)
  Re: Secure Operating Systems (Mack)
  RSA Cryptography Today FAQ (1/1) ([EMAIL PROTECTED])
  Re: Has RSADSI Lost their mind? (Paul Rubin)
  Re: IV for arfour (Guy Macon)
  Re: Let us have Lattice (Tim Tyler)
  Re: Random numbers and online-gambling (Tim Tyler)
  Re: Secure Operating Systems ([EMAIL PROTECTED])
  Re: New William Friedman Crypto Patent (filed in 1933) (Mok-Kong Shen)
  Re: New toy cipher, please comment... (Mok-Kong Shen)
  Q: Functions that are slow to invert (Mok-Kong Shen)
  Re: Let us have Lattice (Mok-Kong Shen)
  Re: Applications for One-Way Function? (Mok-Kong Shen)
  Re: just saw a pre-release copy of Schneier's new book on ebay (Bruce Schneier)
  Coupon collector's problem ("Artemios G. Voyiatzis")



From: "Douglas A. Gwyn" [EMAIL PROTECTED]
Subject: Re: New William Friedman Crypto Patent (filed in 1933)
Date: Sun, 06 Aug 2000 01:45:12 -0400

[EMAIL PROTECTED] wrote:
 ... They could be 50 years backlogged in reviewing material for
 declassification.

There is a fairly recent Executive Order requiring all classified
material to be reviewed and re/declassified after 50 years.  The
amount that was classified over 50 years ago is staggering, and
very likely the backlog is such that they'll never catch up to
the point that they are reviewing just material from 50 to 51
years old.  In addition to this supposedly automatic review,
re/declassification occurs when special attention has been
directed toward specific items, e.g. in response to a FOIA query.
I don't know what triggered the patent declassification; it might
have been in response to the USPTO trying to clean up their own
files.

--

From: "Douglas A. Gwyn" [EMAIL PROTECTED]
Subject: Re: Q: CD
Date: Sun, 06 Aug 2000 01:51:31 -0400

Mok-Kong Shen wrote:
 Is there an easily obtainable software with which one can
 conveniently read out bits from a CD at any specified (hardware)
 position? Thanks.

If you mean the encoded "pits", you'd need special hardware
support.  By the time the information reached the computer
bus it has already been decoded.

If you mean the decoded data, it's almost trivial under many
UNIX-like operating systems:
fd = open("/dev/rdsk/cd0" /* or whatever */ , 0);
lseek(fd, 0, desired_offset);
read(fd, buffer, amount);
close(fd);

--

From: [EMAIL PROTECTED] (Mack)
Subject: Re: Hashing Algorithms
Date: 06 Aug 2000 06:15:52 GMT

I reference Tom McCune here when I say that SHA1 is better than MD5...

http://www.mccune.cc/PGPpage2.htm#Hash

references:

http://www.math.ohio-state.edu/~fiedorow/PGP/MD5_discussion   The good
stuff here!!! (no offense Tom : )


"George" [EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]...
 First I'd like to thank everyone for the speedy responses to my last
question
 about IDEA.  I have done some research on hashing algorithms, and I have
been
 told that the best hashing algorithms are MD5 and SHA.  Am I outdated
again
 with my resources?  What is the most "secure" hashing algorithm available
to
 the public today?  Thank you for your time.


 --
 -George
 [EMAIL PROTECTED]



I believe there is an RSA inc. document recommending against using
MD5 in new designs.  That seems to be a good argument against it
if the company supporting it thinks it is time to start taking it off the
shelf.



Mack
Remove njunk123 from name to reply by e-mail

--

From: [EMAIL PROTECTED] (Mack)
Subject: Re: Secure Operating Systems
Date: 06 Aug 2000 06:27:31 GMT

Mok-Kong Shen [EMAIL PROTECTED] wrote:
[...]
 layered approach. Crypto could then be an outer layer. At the time 
 of design of UNIX, intrusion detection wasn't yet a word in the
 vocabulary of CS, I suppose. To give a (certainly far-fetched) 
[...]

When Unix was written, the world was a whole different place. It was
normal for most places to simply leave the administrative account
logged in on the console all day. (Because any console user was
authorised to use it). Offices in the building didn't generally have
locks on the doors, and the standard login mechanism provided abundant
security against networked intrusion. (After all, there were no
unfriendly hosts, and networks were primarily dial-up connections)
Indeed, crypt(3) itself was impervious to exhaustive search, since a
typical large, timesharing system could manage just over a single key
check per second.

The real answer though, is probably that the average user doesn't need
or want what most people are talking about when you say secure
operating system. It doesn't even