Re: RPOW - Reusable Proofs of Work

2004-08-21 Thread Hal Finney
Matt Crawford writes:
 If you think of POW as a possible SPAM mitigation, how does the first 
 receiving MTA assure the next MTA in line that a message was paid 
 for?  Certainly the mail relay doesn't want to do new work, but the 
 second MTA doesn't know that the first isn't a spambot.

The first MTA would exchange the received RPOW for a new one of equal
value, and pass it along with the message to the next MTA in line.

Hal

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: RPOW - Reusable Proofs of Work

2004-08-21 Thread David Honig
At 04:34 PM 8/20/04 -0500, Matt Crawford wrote:
 I'm wondering how applicable RPOW is.  

If you think of POW as a possible SPAM mitigation

As spam mitigation, it might work better than
hashcash.  As cash, it lacks the anonymity of 
bearer-documents (tm) since there is one
clearing house.  This might be improved via
support for a system of mostly independent
clearing houses which also interchange at 
interchange places.  However, those would likely
be regulated by the Powers That Be, ergo not
alleviating my concerns about anonymity.

My 2 dinars.


=
36 Laurelwood Dr
Irvine CA 92620-1299

VOX: (714) 544-9727 (home) mnemonic: P1G JIG WRAP

ICBM: -117.7621, 33.7275
HTTP: http://68.5.216.23:81 (back up, but not 99.999% reliable)
PGP PUBLIC KEY: by arrangement

Send plain ASCII text not HTML lest ye be misquoted

--

Don't 'sir' me, young man, you have no idea who you're dealing with
Tommy Lee Jones, MIB



No, you're not 'tripping', that is an emu ---Hank R. Hill

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


First quantum crypto bank transfer

2004-08-21 Thread R. A. Hettinga

--- begin forwarded text


From: Andrew Thomas [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: First quantum crypto bank transfer
Date: Fri, 20 Aug 2004 09:05:58 +0200
Sender: [EMAIL PROTECTED]

  Cryptography system goes underground (Aug 19)
  http://physicsweb.org/article/news/8/8/13
   A group of scientists in Austria and Germany has installed an optical
   fibre quantum cryptography system under the streets of Vienna and
used
   it to perform the first quantum secure bank wire transfer (A Poppe et
   al. 2004 Optics Express 12 3865). The quantum cryptography system
   consisted of a transmitter (Alice) at Vienna's City Hall and a
receiver
   (Bob) at the headquarters of an Austrian bank. The sites were linked
by
   1.45 kilometres of single-mode optical fibre.

-- 
Andrew G. Thomas

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RFCs that reference MD5

2004-08-21 Thread Anne Lynn Wheeler
I've made a number of modifications to my rfc index.
if you go to the main url
http://www.garlic.com/~lynn/rfcietff.htm
you'll see a new note about list of RFCs that have some MD5 references in
thier text (i.e. grep on md5 with some number of eliminations)
the display is my standard summary format; if you click on the .txt=
field it retrieves the actual RFC
removed from the list are Obsoleted and/or Historic RFCs.
I've also scanned (actually some gawk) all the RFCs attempting to recognize
any References section and pull out list of referenced RFC numbers.
That information is now added to the RFC summary listings ... in manner
similar to the obsoletes/obsoletedby and updated/updatedby fields ... i.e.
RFCs that are referenced by other RFCs now show the list of Ref'ed By).
the summary listing for 1321 now looks like:
1321 I
The MD5 Message-Digest Algorithm, Rivest R., 1992/04/16 (21pp)
(.txt=35222) (Ref'ed By 1352, 1446, 1479, 1544, 1751, 1828, 1910,
1994, 2264, 2274, 2409, 2938, 3012, 3110, 3174, 3208, 3224, 3230,
3275, 3414, 3631, 3652, 3797)
note that the RFCs mentioned md5 are more than the ones that include
RFC 1321 in their references section (and/or I wasn't able to
correctly recognize some references sections).
--
Anne  Lynn Wheelerhttp://www.garlic.com/~lynn/ 

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: RPOW - Reusable Proofs of Work

2004-08-21 Thread Adam Back
It's like an online ecash system.  Each recipient sends the RPOW back
to the mint that issued it to ask if it has been double spent before
accepting it as valid.  If it's valid (not double spent) the RPOW
server sends back a new RPOW for the receiving server to reuse.

Very like Chaum's online ecash protocol, but with no blinding (for
patent reasons) and using hashcash as way to buy coins.  The other
wrinkle is he can prove the mint can not issue coins without
exchanging them for hashcash or previous issued coins (up to the
limits of the effectiveness of the IBM tamper resistant processor
card, and of course up to the limits of your trust in IBM not to sign
hardware code signing keys that are not generated on board one of
these cards).  This is the same as the remote attestation feature
used in Trustworthy Computing for opposite effect -- restricting
what users can do with their computers; Hal is instead using this to
have a verifiable server where the user can effectively audit and
check what code it is running.

Adam

On Fri, Aug 20, 2004 at 04:34:00PM -0500, Matt Crawford wrote:
 I'm wondering how applicable RPOW is.  Generally speaking, all
 the practical applications I can think of for a proof-of-work
 are defeated if proofs-of-work are storable, transferable, or
 reusable.
 
 I have some code to play online games with cryptographic protection, 
 cards and dice,
 and I am planning to modify it to let people make bets with RPOWs as
 the betting chips.
 
 If you think of POW as a possible SPAM mitigation, how does the first 
 receiving MTA assure the next MTA in line that a message was paid 
 for?  Certainly the mail relay doesn't want to do new work, but the 
 second MTA doesn't know that the first isn't a spambot.
 
 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Good quote about the futility of ID-checking

2004-08-21 Thread Peter Gutmann
Yeterday I watched Gillo Pontecorvo's 1966 film The Battle of Algiers, a
dramatisation of real events that looks at France's own war on terror in
Algeria in the 1950s.  The police attempt to control things by only allowing
people who can show valid ID into the european quarter of Algiers via a few
checkpoints.  When this proves completely ineffective, the French army, led by
a Colonel Mathieu, is called in.  The first thing he does is show his troops
film footage of the checkpoints and the ID checking, pointing out that this
footage is useful because it illustrates how not to do things:

  Checking identity papers is a complete waste of time.  If anyone can be
  counted on to have valid papers, it will be the terrorists.

That's actually a rather astute observation: Joe Sixpack will be lucky to
remember to bring their passport, let alone check whether it's currently valid
and every little detail is correct, but any terrorist will triple-check every
bit of it to make sure that they don't get picked out.  The best that the ID-
checking can hope to do is stop opportunists (as well as any number of
innocent Joe Sixpacks).

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]