Cryptography-Digest Digest #277, Volume #14       Tue, 1 May 01 08:13:01 EDT

Contents:
  Mike Myers (NotMe)
  Re: A Question Regarding Backdoors (Eric Lee Green)
  Re: A Question Regarding Backdoors (Eric Lee Green)
  Re: Censorship Threat at Information Hiding Workshop (David Wagner)
  More on the _Roswell_ puzzle (Yeechang Lee)
  Re: Best, Strongest Algorithm (wtshaw)
  Re: LFSR Security (Benjamin Goldberg)
  Re: More on the _Roswell_ puzzle ("John A. Malley")
  Re: A Question Regarding Backdoors ("Scott Fluhrer")
  Re: Censorship Threat at Information Hiding Workshop ("Roger Schlafly")
  Re: Searching for a free OCSP implementation ("M.E. Post")
  Re: bogus speed claims (just wondering) ("Tom St Denis")
  Re: Best, Strongest Algorithm ("Tom St Denis")
  Re: Censorship Threat at Information Hiding Workshop (Leonard R. Budney)
  Re: Censorship Threat at Information Hiding Workshop (Leonard R. Budney)
  Re: A Question Regarding Backdoors (Mok-Kong Shen)

----------------------------------------------------------------------------

From: NotMe <[EMAIL PROTECTED]>
Subject: Mike Myers
Date: Tue, 01 May 2001 00:27:33 -0400

Anyone knows where he now works?

Reply in sci.crypt

MJ


------------------------------

From: [EMAIL PROTECTED] (Eric Lee Green)
Subject: Re: A Question Regarding Backdoors
Reply-To: [EMAIL PROTECTED]
Date: 30 Apr 2001 23:43:10 -0500

On 30 Apr 2001 22:08:01 GMT, David Wagner <[EMAIL PROTECTED]> wrote:
>You suggest that the NSA may have influence NIST to choose Rijndael
...
>How do propose to reconcile your theory with the fact that polls among
>the open research community showed Rijndael preferred most among all
>contenders, substantially ahead of all its competition?

Part of being paranoid is that he doesn't have to reconcile his theory.
All he has to do is say that you and the rest of the open research
community are all in the pay of the NSA.

Paranoia means never having to make sense. Just blame it all on some
vast conspiracy. :-}. 

-- 
Eric Lee Green  http://www.badtux.org  mailto:[EMAIL PROTECTED]
     Phoenix Branch -- Eric Conspiracy Secret Labs
              Cruisin' the USENET since 1985
   

------------------------------

From: [EMAIL PROTECTED] (Eric Lee Green)
Subject: Re: A Question Regarding Backdoors
Reply-To: [EMAIL PROTECTED]
Date: 30 Apr 2001 23:44:51 -0500

On 1 May 2001 02:08:38 GMT, SCOTT19U.ZIP_GUY <[EMAIL PROTECTED]> wrote:
>[EMAIL PROTECTED] (David Wagner) wrote in 
><9ckno1$3g$[EMAIL PROTECTED]>:
>>How do propose to reconcile your theory with the fact that polls among
>>the open research community showed Rijndael preferred most among all
>>contenders, substantially ahead of all its competition?
>
>   The so called open research community could very well be controled

Whoa! And I thought I was joking when I said that paranoia means
never having to make excuses, because you can just say that everybody
else is part of some vast conspiracy :-). 

-- 
Eric Lee Green  http://www.badtux.org  mailto:[EMAIL PROTECTED]
     Phoenix Branch -- Eric Conspiracy Secret Labs
              Cruisin' the USENET since 1985
   

------------------------------

From: [EMAIL PROTECTED] (David Wagner)
Subject: Re: Censorship Threat at Information Hiding Workshop
Date: 1 May 2001 05:02:26 GMT

Leonard R. Budney wrote:
>The claim that "people are entitled to profit from their creativity"
>*should* be axiomatic with you.

Nonsense.  This is "proof by assertion", and it's hardly a very
persuasive line of argument.

>Note that the Constitution should be interpreted against the backdrop of
>English law, as well as the writings of the founders.

Well, if the words of the Constitution are clear, they would seem
to trump anything a few founders may have written (after all, who
knows what the majority of founders intended?).  And the words of
the Constitution here seem fairly clear on this point.w

(As for English law, US constitutional law differs dramatically from
English law, so unless you have a clear argument why English law
is relevant, I'm assuming I can safely ignore that part.)

But: I'll bite.  What are the writings of the founders you are
referring to?

------------------------------

From: [EMAIL PROTECTED] (Yeechang Lee)
Crossposted-To: rec.puzzles
Subject: More on the _Roswell_ puzzle
Date: Tue, 01 May 2001 05:25:15 GMT

[Spoiler space for those who haven't seen the US 30 Apr 2001 episode
of _Roswell_]























In tonight's episode we are given what a mystery phrase

        LEANNA IS NOT LEANNA

A character observes that including the spaces, it is the same length
as last week's mystery binary code

        10011011100100100111

I've tried the most obvious things (picking out the letters that the
1s mark, the 0s mark, forward and backwards) but haven't gotten
anywhere.  I even tried running some of the resulting words through a
Swedish-English dictionary (a key plot point is whether the author of
these clues, who is now quite dead, actually went to Sweden); no luck
there either.

Ideas?
-- 
<URL:http://www.pobox.com/~ylee/>

------------------------------

From: [EMAIL PROTECTED] (wtshaw)
Subject: Re: Best, Strongest Algorithm
Date: Mon, 30 Apr 2001 23:20:30 -0600

In article <FikH6.101725$[EMAIL PROTECTED]>, "Tom St
Denis" <[EMAIL PROTECTED]> wrote:
> 
> Flaw 1:  The description is clear and concise.
> Flaw 2:  It can be implemented with a small code footprint
> Flaw 3:  It can only use short 256-bit keys.
> 
> Not too hard to tabulate the flaws.
> 
> Tom

These are not flaws as long as longer keys are allowed.  An ideal generic
cipher has no upper limit on key size.
-- 
How many good wells were shut in by the VP's company so that oil 
prices would raise?  It's obvious who did what and why.  

------------------------------

From: Benjamin Goldberg <[EMAIL PROTECTED]>
Crossposted-To: sci.crypt.random-numbers
Subject: Re: LFSR Security
Date: Tue, 01 May 2001 02:01:33 -0400

David Wagner wrote:
> 
> Benjamin Goldberg  wrote:
> >If all our samples are from the same period, then we have fewer
> >samples than there are bits in the state, and thus we cannot fully
> >determine the state.
> 
> What?  If you have a n-bit LFSR with primitive feedback taps,
> the period is 2^n - 1.  Are we using the same terminology?

Oops, brain fart, nevermind.

-- 
Shift to the left, shift to the right, mask in, mask out, BYTE, BYTE,
BYTE !!!

------------------------------

From: "John A. Malley" <[EMAIL PROTECTED]>
Subject: Re: More on the _Roswell_ puzzle
Date: Mon, 30 Apr 2001 23:03:02 -0700


Yeechang Lee wrote:
> 
> [Spoiler space for those who haven't seen the US 30 Apr 2001 episode
> of _Roswell_]
> 
> In tonight's episode we are given what a mystery phrase
> 
>         LEANNA IS NOT LEANNA
> 
> A character observes that including the spaces, it is the same length
> as last week's mystery binary code
> 
>         10011011100100100111
> 
> I've tried the most obvious things (picking out the letters that the
> 1s mark, the 0s mark, forward and backwards) but haven't gotten
> anywhere.  I even tried running some of the resulting words through a
> Swedish-English dictionary (a key plot point is whether the author of
> these clues, who is now quite dead, actually went to Sweden); no luck
> there either.
> 
> Ideas?

Yes.  

Maybe the screen writers thought of it as a code from a code book, like

100110 1 11 0 010 0 100111
LEANNA   IS   NOT   LEANNA 

where each word is encoded as a binary string and the space after a word
ending with a vowel is encoded as a 1 and the space after a word ending
with a consonant is encoded as a 0. You'd need the code book to make
sense of the binary string message.

But I doubt this is going on in episodes of Roswell.

Roswell is just *not* as insidious or dark as the X-Files.  ;-)

Probably it's just a "Hollywood" cipher - it's supposed to look like a
cipher to the layman but it's not a cipher.   It's mathematical
"scenery."


John A. Malley
[EMAIL PROTECTED]

P.S. "Futurama" on FOX features an Alien Language with cribs and
ciphertext appearing in virtually every episode. The Alien Language is a
substitution cipher on English. Check out the "Alien Language Institute"
at 

http://www.people.cornell.edu/pages/bpr6/futurama.html

------------------------------

From: "Scott Fluhrer" <[EMAIL PROTECTED]>
Subject: Re: A Question Regarding Backdoors
Date: Mon, 30 Apr 2001 22:58:51 -0700


Eric Lee Green <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
> On 30 Apr 2001 22:08:01 GMT, David Wagner <[EMAIL PROTECTED]>
wrote:
> >You suggest that the NSA may have influence NIST to choose Rijndael
> ...
> >How do propose to reconcile your theory with the fact that polls among
> >the open research community showed Rijndael preferred most among all
> >contenders, substantially ahead of all its competition?
>
> Part of being paranoid is that he doesn't have to reconcile his theory.
> All he has to do is say that you and the rest of the open research
> community are all in the pay of the NSA.
We are???

Hey, NSA, where's my check? :-)

--
poncho




------------------------------

From: "Roger Schlafly" <[EMAIL PROTECTED]>
Subject: Re: Censorship Threat at Information Hiding Workshop
Date: Tue, 01 May 2001 05:21:35 GMT

"Leonard R. Budney" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
> The claim that "people are entitled to profit from their creativity"
> *should* be axiomatic with you.

The claim was that:
> > >> The premise behind copyright law is that people are entitled to
> > >> profit from their *creativity*, where creativity is defined to be
> > >> "a specific work having some original content".

I agree with Paul; that was certainly not the premise behind US
copyright law.

There is a legitimate argument that when there is profit from creativity,
then the creator is entitled to some reasonable piece of the action.

Whatever the premise of copyright law, different purposes lead to
different conclusions. The laws are getting extremely pro-copyright,
and it is hard to understand how the public good benefits from the
heirs to "Gone With The Wind" suppressing a parody. See this essay.

http://www.nytimes.com/2001/04/30/opinion/30LESS.html

April 30, 2001


Let the Stories Go

By LAWRENCE LESSIG





STANFORD, Calif. - When Margaret Mitchell published "Gone With the Wind" in
1936, the law gave her a copyright for up to 56 years. Under that agreement,
the book should have fallen into the public domain in 1993. Why, then, was
Mitchell's copyright, now owned by her estate, still powerful enough to
prevent the planned publication this month of Alice Randall's "The Wind Done
Gone," a retelling of the story of 19th- century Southern plantation life
from an African-American viewpoint?

...



begin 666 spacer.gif
K1TE&.#EA`0`!`( ``._O[P```"'Y! $`````+ `````!``$```("1 $`.P``
`
end


------------------------------

From: "M.E. Post" <[EMAIL PROTECTED]>
Crossposted-To: comp.security.misc
Subject: Re: Searching for a free OCSP implementation
Date: Tue, 01 May 2001 09:34:56 GMT

"Tomas Perlines Hormann" <[EMAIL PROTECTED]> wrote in
message news:[EMAIL PROTECTED]...
> Hi,
>
> I am currently working on my master's thesis about SignedContent and
> need an implementation of the "Online Certificate Status Protocol
> (OCSP)" as specified in IETF RFC 2560.
> My purpose is to evaluate different certificate validation techniques
> within a PKI.
>
> Does anybody know of a free implementation? I would be very grateful if
> anybody could direct me to some freely available implementations.

Have a look at the OpenCA project, they have an OCSP implementation and
they're Open Source (http://openca.sourceforge.net/). Also have a look at
the wonderfull stuff of µPKI (http://security.dstc.com/products/upki/), tehy
don't do OCSP, only CRL checking, but it may provide you with some usefull
information.

hth

Meint



------------------------------

From: "Tom St Denis" <[EMAIL PROTECTED]>
Subject: Re: bogus speed claims (just wondering)
Date: Tue, 01 May 2001 10:07:47 GMT


"Roger Fleming" <[EMAIL PROTECTED]> wrote in message
news:3aee31a4$0$25478$[EMAIL PROTECTED]...
> "Tom St Denis" <[EMAIL PROTECTED]> wrote:
> [...]
> >Again bashing CS-Cipher it's possible to implement the 8x8 sbox as a
3-round
> >feistel using two 4x4 sboxes.  in that case I could see about 500 bytes
but
> >that wouldn't be anywhere approaching 20kbit/sec then.
> >
> >Or look at Twofish, you could do the sboxes (two 8x8's) as the repeated
sub,
> >but that would be way to slow.  So you would need to store em as two
8x8's
> >requiring 512 bytes, plus the round function requires at least 16 bytes
for[...]
>
> In estimates of minimal code size, it's quite normal to omit the size of
fixed
> tables, on the assumption they'll be stored in ROM if you need a very
small
> memory footprint. Omitting the size of non-fixed tables is less easy to
> justify (they might be generated and stored in EEPROM, but that's usually
a
> lot slower than RAM), but also a pretty common practice.
>
> If you see someone claiming a code size of 500 B when he needs a 256 B
table,
> that probably means the table is in ROM or EEPROM, and what he means is "I
can
> make this algorithm run on a microcontroller with 512 B of RAM".

Then why don't they say that?  Are they afraid it wouldn't seem so cool?

Tom



------------------------------

From: "Tom St Denis" <[EMAIL PROTECTED]>
Subject: Re: Best, Strongest Algorithm
Date: Tue, 01 May 2001 10:09:00 GMT


"wtshaw" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
> In article <FikH6.101725$[EMAIL PROTECTED]>, "Tom St
> Denis" <[EMAIL PROTECTED]> wrote:
> >
> > Flaw 1:  The description is clear and concise.
> > Flaw 2:  It can be implemented with a small code footprint
> > Flaw 3:  It can only use short 256-bit keys.
> >
> > Not too hard to tabulate the flaws.
> >
> > Tom
>
> These are not flaws as long as longer keys are allowed.  An ideal generic
> cipher has no upper limit on key size.

Um, dude I was kidding, I was trying to bring light to someone elses
attitude here...

Tom



------------------------------

Subject: Re: Censorship Threat at Information Hiding Workshop
From: [EMAIL PROTECTED] (Leonard R. Budney)
Date: 01 May 2001 06:29:45 -0400

[EMAIL PROTECTED] (David Wagner) writes:
> Leonard R. Budney wrote:
>> The claim that "people are entitled to profit from their creativity"
>> *should* be axiomatic with you.
> 
> Nonsense.  This is "proof by assertion", and it's hardly a very
> persuasive line of argument.

No. It's assertion by assertion, idiot. Furthermore, it's an assertion
of an *axiom*. One does not prove axioms, idiot. Better stay at Berkeley
a while longer.

> (As for English law, US constitutional law differs dramatically from
> English law, so unless you have a clear argument why English law
> is relevant, I'm assuming I can safely ignore that part.)

"Copyright" is not a concept on which Americans have a monopoly, idiot.
There are international notions of copyright, and foreign notions of
copyright, and moral arguments concerning copyright.

Len.



-- 
Everything you say here is wrong.
                                -- Dan Bernstein

------------------------------

Subject: Re: Censorship Threat at Information Hiding Workshop
From: [EMAIL PROTECTED] (Leonard R. Budney)
Date: 01 May 2001 06:33:39 -0400

"Roger Schlafly" <[EMAIL PROTECTED]> writes:

> The claim was that:
>>>>> The premise behind copyright law is that people are entitled to
>>>>> profit from their *creativity*, where creativity is defined to be
>>>>> "a specific work having some original content".
> 
> I agree with Paul; that was certainly not the premise behind US
> copyright law.

1,000 pardons. I was using the expression "the idea behind the law" in
a loose and sloppy way. It was never intended as an assertion about
the state of mind of the US founders; nor did I intend to focus solely
on *US* law.

> There is a legitimate argument that when there is profit from creativity,
> then the creator is entitled to some reasonable piece of the action.

Right.

> Whatever the premise of copyright law, different purposes lead to
> different conclusions. The laws are getting extremely pro-copyright,
> and it is hard to understand how the public good benefits from the
> heirs to "Gone With The Wind" suppressing a parody. See this essay.

Agreed. (Indeed, I'd rather see the 1710 statute restored: 14-year
copyrights, with at most one renewal. The publishers' lawsuit arose
because assignees did *not* have the right of renewal; only the
authors.)

Len.


-- 
Frugal Tip #15:
Keep whistling the Old Spice Aftershave jingle until people give you
money to stop.

------------------------------

From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Re: A Question Regarding Backdoors
Date: Tue, 01 May 2001 13:17:37 +0200



"SCOTT19U.ZIP_GUY" wrote:
> 
>    The so called open research community could very well be controled
> directly or indirectly what directions the reseach goes. How
> can you explain that over the years they have refused bijective
> padding to get message the correct length for certain modes.
> Even the authors of Rijndael lack much knowlede. When I wrote
..... [snip]

Excepting trivially true tautologies, there is, as far as
I am aware, nothing in the world that you can 'prove' in 
the 'absolute' sense, for there are always axioms involved 
that by definition are not 'proved'. It follows on the 
other hand that you also always have pretty freedom in 
hypothesizing much what is 'convenient' for your mind 
without others being able to concretely make refutations.

You (and anyone else as well) may happen to come up with 
ideas and theories that are better than those of the 
other people. But it is up to you to present your stuffs 
in such a way that more (hopefully all) people will get 
convinced. That is, you have to manage to publish (in an
appropriate permanently accessible form) your materials 
(your algorithms, your arguments of the presence of 
backdoors etc. etc. etc.) in such a manner that with time 
more and more people would be on your side. Simply 
repeating and repeating the same sentences in the group 
that certain angencies plant backdoor, that all researchers 
in the open community are controlled, that your own
algorithm is probably the single best one in the world, 
etc. etc. etc. isn't a very good stategy in my humble view. 
For, after a few repetitions, these become nothing but 
(boring) dogmas in the eyes of the readers, i.e. stuffs 
of the sort that priesters think they could hammer into 
the heads of the audience through proclaiming the same 
again, again and again without giving supports and 
verifications in the sense of natural sciences. Dogmas 
may be indeed very good for propagating religions, but 
certainly not for the advancement of sciences, including 
in particular crypto, the subject of our group.

I suppose that currently with the relaxation of the US 
export regulations you are entirely free to post any 
scientific materials on your site (maybe with a formal
notification to an authority). So why don't you spend 
your time and energy to make your stuffs more attractive 
(understandable, convicing) to the public, instead of 
arguing rather fruitlessly (as the experience shows) 
again and again in the group in the same way? Note 
though that in publishing you are in competition 
with other writers, including in particular the 
researchers who you believe are under the control of 
certain agencies. If your materials are closer to the
truth (or indeed ARE the truth, who knows?) and your 
presentations are superior, you'll succeed in propagating 
your ideas and theories to the public, just like a 
businessman with good products and intelligent marketing 
will become rich. Isn't that a good suggestion for you?

M. K. Shen

------------------------------


** FOR YOUR REFERENCE **

The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:

    Internet: [EMAIL PROTECTED]

You can send mail to the entire list by posting to sci.crypt.

End of Cryptography-Digest Digest
******************************

Reply via email to