preparing a web 2.0 crypto talk

2009-02-14 Thread Travis
must have powerpoint-fu whereas I'm using lyx Any opinions? -- Crypto ergo sum. http://www.subspacefield.org/~travis/ Do unto other faiths as you would have them do unto yours. If you are a spammer, please email j...@subspacefield.org to

peer review of presentation requested

2009-02-24 Thread Travis
-- Obama Nation | It's not like I'm encrypting... it's more like I've developed a massive entropy deficiency | http://www.subsubpacefield.org/~travis/ If you are a spammer, please email j...@subspacefield.org to get blacklisted. ---

Re: peer review of presentation requested

2009-02-25 Thread Travis
ire, if people came away with the notion that _now_ they are educated enough on crypto to make informed decisions about new combinations. Maybe I should make a point of telling them that this is not the case. -- Obama Nation | It's not like I'm encrypting... it's more like I'

X.509 certificate overview + status

2009-03-02 Thread Travis
7;m not sure if that's wise. I'm plowing through the O'Reilly OpenSSL book, but are there other resources out there that could help me, or others like me? -- Obama Nation | It's not like I'm encrypting... it's more like I've developed a massive entropy defi

CSPRNG algorithms

2009-04-30 Thread Travis
ere a survey somewhere? If not, would people like to help me create one by emailing me references to extant PRNG definitions? -- Obama Nation | It's not like I'm encrypting... it's more like I've developed a massive entropy deficiency | http://www.subsubpacefield.org/~trav

EDP (entropy distribution protocol), userland PRNG design

2005-10-12 Thread Travis H.
5) Multiple clients petitioning the daemon for random bits at once. However, this is also a good thing; two consecutive values used by a client may not be consecutive outputs from the PRNG subsystem. Comments? -- http://www.lightconsulting.com/~travis/ -><- "We already have

Re: Venona not all decrypted?

2005-10-12 Thread Travis H.
n Russian, so you can subtract that from 2 times the entropy of typical Russian plaintext, and if that's greater than zero, you're working magic. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson G

Re: EDP (entropy distribution protocol), userland PRNG design

2005-10-18 Thread Travis H.
ength is the same or higher. What I'm saying is that a chain is only as strong as its weakest link, and my protocol has one less link. > at little or no extra cost. You can buy a PCI board with a low-end Hifn crypto > chip on it for less than $80 online. For anyone who is interest

SecurID and garage door openers

2005-10-18 Thread Travis H.
a garage door? http://www.cap-lore.com/Garage/ -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B --

Re: EDP (entropy distribution protocol), userland PRNG design

2005-10-19 Thread Travis H.
this is a one-way function, so you'd have to mount a search on the key used if you want to be able to interpret how the network traffic is used downstream. Of course you'd want a cipher such that encryption with a random key doesn't introduce any bias. -- http://www.lightconsultin

Re: [Clips] Read two biometrics, get worse results - how it works

2005-10-21 Thread Travis H.
lse positive, so in fact your chances of actually having the condition are merely 1 in 100. For a prolonged explanation, see this paper: http://www.raid-symposium.org/raid99/PAPERS/Axelsson.pdf -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems.

Re: [EMAIL PROTECTED]: Skype security evaluation]

2005-10-24 Thread Travis H.
t offers opinions (see the complaints of vagueness above). Summary: All that having been said, I still have more confidence in Skype than I did before reading the paper. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier &

Re: EDP (entropy distribution protocol), userland PRNG design

2005-10-24 Thread Travis H.
t and simple, what I mean is that it obviously has no weaknesses, as opposed to having no obvious weaknesses. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B

semi-preditcable OTPs

2005-10-25 Thread Travis H.
tconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The Cryptography Mailing List

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Travis H.
op in the CD and it announces its availability to various locator services to act as a Tor, mixmaster, or whatever node. Again, keep me informed if anyone starts work on this. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schne

Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like Payment Systems

2005-10-26 Thread Travis H.
the irreversible payment using Western Union, and later finds out the credit card used to make the paypal payment was stolen when paypal reverses the transaction, leaving the victim short. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems."

Re: packet traffic analysis

2005-10-31 Thread Travis H.
e TA resistance (esp. in the presence of an attacker who may prevent transmission of segments). -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2

Re: packet traffic analysis

2005-10-31 Thread Travis H.
as an exercise for the reader. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B -

Re: NY Times reports: NSA falsified Gulf of Tonkin intercepts

2005-11-01 Thread Travis H.
aints is a very confused one. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B

Re: Symmetric ciphers as hash functions

2005-11-01 Thread Travis H.
The latest hashes, such as SHA-1, gave up on Feistel. It's not necessary for the hash to be invertible, but OTOH there's no guarantee of the lack of collisions. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier

Re: Symmetric ciphers as hash functions

2005-11-03 Thread Travis H.
. Perhaps he intends to hide the hash inside the encryption, in which case he might be better off doing authentication+encryption. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 1

Re: On Digital Cash-like Payment Systems

2005-11-07 Thread Travis H.
over a certain size, then perhaps you can claim some kind of resilience against them. *shrug* -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2

gonzo cryptography; how would you improve existing cryptosystems?

2005-11-07 Thread Travis H.
elow. I got to successfully use classical cryptanalysis on a relatively modern system! That is a rare joy. CFS really needs a re-write, there's no real good alternatives for cross-platform filesystem encryption to my knowledge. -- http://www.lightconsulting.com/~travis/ -><- "We alr

Re: gonzo cryptography; how would you improve existing cryptosystems?

2005-11-07 Thread Travis H.
> Does ISAKMP do encryption where the input is > meant to be secret, instead of the key? I meant MAC, not encryption, sorry. Of course encryption inputs are secret. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- S

Re: On the orthogonality of anonymity to current market demand

2005-11-07 Thread Travis H.
isn't something I'm willing to concede to any vendor, or for that matter any other person. I like knowing what my computer is doing, to the bit and byte level, or at least being able to find out. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecu

Fermat's primality test vs. Miller-Rabin

2005-11-08 Thread Travis H.
Apparently that's not true for most bases of Carmichael numbers. Is that the distinction that makes Miller-Rabin a stronger primality test? It's amazing how many words that took to state, and I didn't even specify the squaring process. -- http://www.lightconsulting.com/~travis/

Re: gonzo cryptography; how would you improve existing cryptosystems?

2005-11-08 Thread Travis H.
ght after installation I tried using it to read a container copied from a corrupted Windows machine, but was not successful. It is unclear to me if this was due to the corruption which occured, or some kind of incompatibility between the Windows and Linux ports. -- http://www.lightconsulting.com/~t

Re: Fermat's primality test vs. Miller-Rabin

2005-11-14 Thread Travis H.
appear to save some exponentiations, but it also appears to check that the last (temporally) non-1 square root of 1 we used was -1, which it must be if n is prime, making it a stronger test than Fermat's. Wikipedia concurs that MR is preferred over Fermat, primarily (pun intended) because of

Re: On Digital Cash-like Payment Systems

2005-11-14 Thread Travis H.
course, you're auditing network flows over a certain size or lasting a certain amount of time. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 6

Re: Pseudorandom Number Generator in Ansi X9.17

2005-11-15 Thread Travis H.
In Practical Cryptography, Schneier discusses a new PRNG design called Fortuna. It has some neat features. He also discusses problems with the ANSI PRNG here: http://www.schneier.com/paper-prngs.html -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insec

timing attack countermeasures (nonrandom but unpredictable delays)

2005-11-15 Thread Travis H.
delay function. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The

Re: the effects of a spy

2005-11-17 Thread Travis H.
to.pdf -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The Crypto

solving, simplification and factorization of boolean equations

2005-11-17 Thread Travis H.
rtain and don't quite know where to start reading on the subject. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5

Re: timing attack countermeasures (nonrandom but unpredictable delays)

2005-11-17 Thread Travis H.
ion of the inputs. Averaging with repeated evaluations of the same k and x allows one to compute the mean value of r, and the sum f+d, but I don't see how that helps one seperate f from d. What am I missing? -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast

Re: timing attack countermeasures (nonrandom but unpredictable delays)

2005-11-30 Thread Travis H.
t both timing and power consumption side-channel attacks? -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B ---

Re: timing attack countermeasures (nonrandom but unpredictable de lays)

2005-11-30 Thread Travis H.
ction is just another output to the attacker, and should have the same properties that any other output has with respect to the inputs one wishes to keep secret. It does not have to be constant. -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecu

security modifications to current PCs

2005-12-02 Thread Travis H.
essor machine and it's still slow. The load climbs to 10 or 12 all too easily, then stuff becomes unresponsive (perhaps because swap is one of the things I'm encrypting). -- http://www.lightconsulting.com/~travis/ -><- "We already have enough fast, insecure systems." --

Re: Haskell crypto

2005-12-02 Thread Travis H.
useful for finding problems in code branches that aren't taken frequently and thus might be missed by test vectors. I'm not sure how many ciphers have this characteristic, I think Schneier mentioned that IDEA does, among others. -- http://www.lightconsulting.com/~travis/ ->&

Re: Proving the randomness of a random number generator?

2005-12-04 Thread Travis H.
even necessary that *trapdoor* one-way functions exist, which is a common assumption in public-key systems. For more information, see "Pseudorandomness and Cryptographic Applications", ISBN 0-691-02546-0, by Michael Luby. Warning: theory-intensive. -- http://www.lightconsulting.com/~travis/

RNG implementations and their problems

2005-12-04 Thread Travis H.
action to remedy this situation if I am not overlooking something simple. -- http://www.lightconsulting.com/~travis/ -><- Knight of the Lambda Calculus "We already have enough fast, insecure systems." -- Schneier &

Re: Proving the randomness of a random number generator?

2005-12-05 Thread Travis H.
then an investigation of the physical proceses involved and careful measurement (of the generation device, not the digital output!) is the only proper way to get some assurance. I'll sidestep the question of whether anything is really nondeterministic for the moment (God is omniscient, o

Re: [Clips] Diebold insider alleges company plagued by technical woes

2005-12-08 Thread Travis H.
Does anyone here have any links to voting system designs that use cryptography to achieve their goals? I'm curious what could be achieved in that direction. -- http://www.lightconsulting.com/~travis/ -><- Knight of the Lambda Calculus "We already have enough fast, insecure syste

Re: [Clips] Engineer Outwits Fingerprint Recognition Devices with Play-Doh

2005-12-12 Thread Travis H.
g.com/~travis/ -><- Knight of the Lambda Calculus "We already have enough fast, insecure systems." -- Schneier & Ferguson GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The Cryptography Ma

another feature RNGs could provide

2005-12-12 Thread Travis H.
s not necessarily a power of 2? 3) Is there any point in offering a permutation generator that is not cryptographically strong? -- http://www.lightconsulting.com/~travis/ -><- P=NP if (P=0 or N=1) "My love for mathematics is unto 1/x as x approaches 0." GPG fingerprint: 50A1 15C

crypto for the average programmer

2005-12-12 Thread Travis H.
braries and programs don't distinguish between the two, and so you risk giving the attacker known plaintext when post-processing them (and you don't know exactly how much unless you dive into file format specifics). Would it be useful enough to merit the effort? -- http://www.lightconsulting

crypto wiki -- good idea, bad idea?

2005-12-12 Thread Travis H.
edia? Is it doing a satisfactory job? Your opinions welcome. -- http://www.lightconsulting.com/~travis/ -><- P=NP if (P=0 or N=1) "My love for mathematics is unto 1/x as x approaches 0." GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98

Re: X.509 / PKI, PGP, and IBE Secure Email Technologies

2005-12-12 Thread Travis H.
I'm open to any suggestions along these lines. -- http://www.lightconsulting.com/~travis/ -><- P=NP if (P=0 or N=1) "My love for mathematics is unto 1/x as x approaches 0." GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B ---

Re: secure links using classical (i.e., non-quantum) physics

2005-12-14 Thread Travis H.
I am discussing implementing a very simple version of this with the author. If anyone else is interested in participating or just watching, email me and I'll keep you in the loop. -- http://www.lightconsulting.com/~travis/ -><- P=NP if (P=0 or N=1) "My love for mathematics

Re: crypto for the average programmer

2005-12-14 Thread Travis H.
c, fast-paced environment? And with that, I'm out. :-P -- http://www.lightconsulting.com/~travis/ -><- P=NP if (P=0 or N=1) "My love for mathematics is like 1/x as x approaches 0." GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B

Re: crypto for the average programmer

2005-12-18 Thread Travis H.
account for 50% of the current vulnerabilities the way buffer overflows do. -- http://www.lightconsulting.com/~travis/ -><- P=NP if (P=0 or N=1) "My love for mathematics is like 1/x as x approaches 0." GPG fingerprint: 50A

Re: Crypto and UI issues

2005-12-19 Thread Travis H.
also no way to disable that warning. > > An expert will reflexively click through a dialog that > > is almost certainly a false negative. > > That's just not true. It reminds me of the base-rate fallacy: http://www.raid-symposium.org/raid99/PAPERS/Axelsson.pdf -- http:

Re: crypto for the average programmer

2005-12-19 Thread Travis H.
On 12/19/05, Richard Levitte - VMS Whacker <[EMAIL PROTECTED]> wrote: > C has three really strong points: > > - portability. It's one of the most wide-spread and portable > compiled languages that I know of. I beg your pardon? If I want to store 128 bits of information, and access the 8 most

Re: crypto for the average programmer

2005-12-19 Thread Travis H.
cation so far, though some use libraries ("modules") that aren't available on the target. I realized halfway through this that I was thinking of applications that use crypto, and not crypto algorithms per se. But pretty much we sound like we're in agreement on most things. -- http://w

whoops (residues in a finite field)

2005-12-19 Thread Travis H.
g to that effect, so that the percieved performance problem is minimized. Lie to the users? Remind me to not use that guy's software. I'll take correct over fast any day. -- http://www.lightconsulting.com/~travis/ -><- P=NP if (P=0 or N=1) "My love for mathematics is like 1/x

Re: another feature RNGs could provide

2005-12-22 Thread Travis H.
le encryption? The other day I was thinking of using a very large key to select a permutation at random from the symmetric group S_(2^x). That would be a group, but I don't see how you knowing that I'm using a random permutation would help you at all. -- http://www.lightconsulting.com/~

Re: RNG quality verification

2005-12-22 Thread Travis H.
in. Predictable seed -> predictable output. If that bootstrap is wrong, you can treat everything else as an oracle and still get a good distinguisher. -- http://www.lightconsulting.com/~travis/ "You are free... to do as we tell you!" ->

Re: RNG quality verification

2005-12-27 Thread Travis H.
On 12/23/05, Philipp Gühring <[EMAIL PROTECTED]> wrote: > It´s easy to say that it´s their responsibility. > But how should they do it? Very carefully. Picking random numbers is far too important to be left to chance. -- http://www.lightconsulting.com/~travis/ "Vast emptines

Re: another feature RNGs could provide

2005-12-27 Thread Travis H.
strength of your cipher from 2^x to 2^(x/2)? Almost true. The cardinality of the symmetric group S_(2^x) is (2^x)!, so it reduces it from (2^x)! to roughly sqrt((2^x)!). That's still a lot. I suspect this is some information-theoretic limit for x-bit block ciphers. -- http://www.lightc

new openssh directions

2005-12-28 Thread Travis H.
tconsulting.com/~travis/ "Vast emptiness, nothing sacred." -- Bodhidharma -><- GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

long-term GPG signing key

2006-01-10 Thread Travis H.
h *are* tied to a email address and have shorter expiration times. Does anyone have any suggestions on how to do this, or suggestions to the effect that I should be doing something else? -- "If I could remember the names of these particles, I would have been a botanist" -- Enrico Fermi -&g

Re: phone records for sale.

2006-01-10 Thread Travis H.
been a botanist" -- Enrico Fermi -><- http://www.lightconsulting.com/~travis/ GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Re: long-term GPG signing key

2006-01-11 Thread Travis H.
'd have been a botanist" -- Enrico Fermi -><- http://www.lightconsulting.com/~travis/ GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Re: long-term GPG signing key

2006-01-13 Thread Travis H.
y. *bonks forehead* -- http://www.lightconsulting.com/~travis/ "Vast emptiness, nothing sacred." -- Bodhidharma -><- GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The Cryptography Mailing L

Re: Echelon papers leaked

2006-01-18 Thread Travis H.
Two chapters are online here: http://www.fas.org/irp/eprint/sp/ -- "If I could remember the names of these particles, I would have been a botanist" -- Enrico Fermi -><- http://www.lightconsulting.com/~travis/ GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E

Re: quantum chip built

2006-01-19 Thread Travis H.
ut if that doesn't work out my second bet is on computation en masse. -- "If I could remember the names of these particles, I would have been a botanist" -- Enrico Fermi (apropos, no?) -><- http://www.lightconsulting.com/~travis/ GPG fingerprint

thoughts on one time pads

2006-01-26 Thread Travis H.
saying he was working on a OTP system, but never heard any more about it (let's not discuss him though please, this thread is about one time pads). -- "The generation of random numbers is too important to be left to chance." -- Robert R. Coveyou -><- http:

a crypto wiki

2006-01-26 Thread Travis H.
http://www.cryptodox.com/Main_Page -- "The generation of random numbers is too important to be left to chance." -- Robert Coveyou -><- http://www.lightconsulting.com/~travis/ GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E

Re: thoughts on one time pads

2006-01-27 Thread Travis H.
all that > Stinson has a really nice survey of this either webbed or in his > book. (Anyone else remember?) I have his book, I'll check both. I seem to remember him discussing authentication a lot in the book. -- "The generation of random numbers is too important to be left to ch

Re: thoughts on one time pads

2006-01-28 Thread Travis H.
y if the attacker gets access to the overwritten data, but it degrades into an attack on the conventional cipher. I wonder how remanance in flash drives fares. -- "The generation of random numbers is too important to be left to chance." --

CD shredders, was Re: thoughts on one time pads

2006-02-01 Thread Travis H.
them pitted: http://www.thinkgeek.com/gadgets/security/6d7f/ -- "The generation of random numbers is too important to be left to chance." -- Robert Coveyou -><- http://www.lightconsulting.com/~travis/ GPG fingerpr

Re: Unforgeable dialog.

2006-02-03 Thread Travis H.
solitude is either a wild beast or a god." -><- http://www.lightconsulting.com/~travis/ GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The Cryptography Mailing List Unsubscribe by sending "

Hiding data on 3.5" using "40 track mode"

2006-02-04 Thread Travis H.
u suppose this trick works? The official details are, of course, vague. -- "Whosoever is delighted in solitude is either a wild beast or a god." -><- http://www.lightconsulting.com/~travis/ GPG fingerprint: 50A1 15C5 A9D

Re: serious threat models

2006-02-04 Thread Travis H.
ne calls to 14 prepaid mobile phones where the calls were recorded.'' I bet you can find a manual for one of these switches online somewhere, should you be suitably motivated. -- "Whosoever is delighted in solitude is either a wild beast or a god." -><- http://www.lightco

methods of filling encrypted disks

2006-02-04 Thread Travis H.
"fill with random bits" protects against. -- "Whosoever is delighted in solitude is either a wild beast or a god." -><- http://www.lightconsulting.com/~travis/ GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B ---

Re: EDP (entropy distribution protocol), userland PRNG design

2006-02-04 Thread Travis H.
Assume that one is the sole user of a LAN and that the 10-20 machines on this network have a need for unpredictable numbers. Assume further that it is not cost-effective to furnish each with a HWRNG, even one as inexpensive as a sound card (for example, they may not have a spare slot on the mother

Re: thoughts on one time pads

2006-02-08 Thread Travis H.
. -- "Whosoever is delighted in solitude is either a wild beast or a god." -><- http://www.lightconsulting.com/~travis/ GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The Cryptography Mailing List Unsubs

general defensive crypto coding principles

2006-02-08 Thread Travis H.
think of? -- "Whosoever is delighted in solitude is either a wild beast or a god." -><- http://www.lightconsulting.com/~travis/ GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Re: general defensive crypto coding principles

2006-02-11 Thread Travis H.
rk for discussing various paranoid delusions." -- Don Alvarez http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B - The Cryptography Mailing List Unsubscribe

choosing building blocks, was Re: general defensive crypto coding principles

2006-02-14 Thread Travis H.
A cracker would have to exhaustively test the input space for every incorrect guess at the password, whereas a valid password would require one half the amount of computation (on average), ignoring collisions. -- "Cryptography is nothing more than a mathematical framework for discuss

hamachi p2p vpn nat-friendly protocol details

2006-02-23 Thread Travis H.
http://www.hamachi.cc/security Based on a cursory look over this, I'm impressed by both the level of detail and the level of security apparently afforded. Too bad I can't see the source code. -- Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint

Re: NPR : E-Mail Encryption Rare in Everyday Use

2006-02-24 Thread Travis H.
Does it avoid the need to get a "path" to the recipient or their server? -- Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Re: hamachi p2p vpn nat-friendly protocol details

2006-02-26 Thread Travis H.
outs. Aside: Can anyone tell me why the constants used in ipad and opad for HMAC were chosen? If they're not arbitrary, I'd like to know the rationale behind them. -- Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066

bulk quantum computation

2006-03-08 Thread Travis H.
like a much smaller number of pure qubits." -- Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 - The Cryptography Mailing List Unsu

bounded storage model - why is R organized as 2-d array?

2006-03-08 Thread Travis H.
-- Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

pipad, was Re: bounded storage model - why is R organized as 2-d array?

2006-03-20 Thread Travis H.
ram.com/BBPFormula.html I dub this "pi pad". Is this idea transcendental or irrational? -- Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 [Moderator's note: I'd say "

passphrases with more than 160 bits of entropy

2006-03-21 Thread Travis H.
s thinking that one could hash the first block, copy the intermediate state, finalize it, then continue the intermediate result with the next block, and finalize that. Is this safe? Is there a better alternative? -- Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG f

Re: Linux RNG paper

2006-03-23 Thread Travis H.
generator, the equation is: i' = (i * 1103515245 + 12345) & 0x7fff As far as low-hanging fruit goes, the higher generator types still never set the highest order bit (RAND_MAX is 0x7fff), and the outputs are unaltered pool contents. -- Security Guru for Hire http://www.lightconsulting.com/~

is breaking RSA at least as hard as factoring or vice-versa?

2006-04-02 Thread Travis H.
urrent state of knowledge? -- Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 - The Cryptography Mailing List Unsubscribe by sending "

excellent wifi security page

2006-04-13 Thread Travis H.
http://www.drizzle.com/~aboba/IEEE/ -- "Curiousity killed the cat, but for a while I was a suspect" -- Steven Wright Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6

non-cartesian A codes

2006-04-17 Thread Travis H.
u for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

non-cartesian A codes and latin squares

2006-04-30 Thread Travis H.
ted to be sure I was understanding it correctly... -- "Curiousity killed the cat, but for a while I was a suspect" -- Steven Wright Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC

Re: PGP "master keys"

2006-05-01 Thread Travis H.
ust one use it in order to retain it? -- "Curiousity killed the cat, but for a while I was a suspect" -- Steven Wright Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 -

Re: encrypted file system issues (was Re: PGP "master keys")

2006-05-01 Thread Travis H.
ngs I used to run NetBSD 1.6 IIRC, and for some reason cgd was in previous and later releases but not that one. I found that puzzling. -- "Curiousity killed the cat, but for a while I was a suspect" -- Steven Wright Security Guru for Hire http://www.lightconsulting.com/~travis/ ->

what's wrong with HMAC?

2006-05-01 Thread Travis H.
quot; -- Steven Wright Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 - The Cryptography Mailing List Unsubscribe by sending "un

cryptography@metzdowd.com

2006-05-01 Thread Travis H.
Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Re: fyi: Deniable File System - Rubberhose

2006-05-02 Thread Travis H.
ect" -- Steven Wright Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 - The Cryptography Mailing List Unsubscribe by sending &quo

Intel microcode update encryption

2006-05-02 Thread Travis H.
own to all but about ten guys in Intel. Writing your own "jump to ring zero" instruction is left as an exercise to the reader. -- "Curiousity killed the cat, but for a while I was a suspect" -- Steven Wright Security Guru for Hire http://www.lightconsulting.com/~travis/ ->&

Re: Linux RNG paper

2006-05-04 Thread Travis H.
;s trickier to handle than a 1:1 correspondence. -- "Curiousity killed the cat, but for a while I was a suspect" -- Steven Wright Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395

Re: Linux RNG paper

2006-05-05 Thread Travis H.
right now so I can't tell you if it's vulnerable. -- "Curiousity killed the cat, but for a while I was a suspect" -- Steven Wright Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3

picking a hash function to be encrypted

2006-05-14 Thread Travis H.
ect" -- Steven Wright Security Guru for Hire http://www.lightconsulting.com/~travis/ -><- GPG fingerprint: 9D3F 395A DAC5 5CCC 9066 151D 0A6B 4098 0C55 1484 - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

  1   2   3   >