RE: decrypt form variable... WAY more than you wanted to know.

2000-05-21 Thread Mike Sheldon

IDEA has been shown to have some weak keys. However, the odds of you
actually choosing such a key are nearly non-existent (The weak keys fall
into a certain pattern which doesn't fit any normal password.) The odds of
choosing one randomly are 1 in 2^96. There is also an XOR value that can be
run against keys that will completely eliminate the possibility of producing
a weak key.

RC5 is relatively untested at this point, and is therefore of unknown
security. Also, RSA has applied for patent on RC5, so it's not available for
use without license. (This will also likely discourage further attempts to
test it by the experts.)

Using a block cipher in place of a stream cipher does not make it a stream
cipher. :) It's still a block cipher. The lesson here is that unless you are
dealing with "continual real-time transmission" of data, stream ciphers are
not called for. (Even many transmission situations do not call for stream
ciphers, ie. SSL and IPsec, which use block ciphers.)

Undoubtedly, my favorite is Blowfish. I've used it, it performs very well,
source-code is readily available (www.counterpane.com), there are is known
crytanalysis against non-reduced-round Blowfish, and there are no licensing
issues.

Note that 16-round Blowfish (standard) is more than twice as fast as
16-round RC5, and 20-round Blowfish is still almost twice as fast. In order
to beat 20-round Blowfish, you would have to drop to 8 rounds of RC5. (RC5
is a real dog, though not as slow as DES) Note that Twofish is slightly
faster than Blowfish, even though it has a 128 bit block size vs. the 64 bit
block size of Blowfish and RC5.

Some more info on Twofish:

Twofish is from the same people who brought you Blowfish. (Bet you'd never
have guessed!) It is their submission for the Advanced Encryption Standard
(AES) which will replace DES. Currently, it is one of five finalists from an
original group of fifteen. It is unpatented, source code is uncopyrighted,
and is available for use without license. (code can be downloaded from
www.counterpane.com) It's also one of the most tested algorithms out there,
since the competition is banging on it to try to prove it unsuitable, in
favor of their own algorithms.


Michael J. Sheldon
Internet Applications Developer
Phone: 480.699.1084
http://www.desertraven.com/
PGP Key Available on Request

-Original Message-
From: David Cummins [mailto:[EMAIL PROTECTED]]
Sent: Saturday, May 20, 2000 20:18
To: [EMAIL PROTECTED]
Subject: Re: decrypt form variable...


Whoa! That's a rather complete answer... ;)

Although I would warn that some of the "cryptographically strong" schemes
have
been shown to have some weak keys, i.e. I think IDEA has some weak keys.
From
what I'm aware, RC5 with 16 rounds does not (so I'm a fan).

As far as stream ciphers go, could you just use a block cipher with an 8 bit
block size, and some form of cipher block chaining as a stream cipher? I
realise
8 bit sounds a bit (ok, a lot) low, but CBC does help. Maybe the stream
could
start with a random word (you know, like Unix salting).

David

Mike Sheldon wrote:

 Care to suggest a few? I've seen several, but I'm not sure how to
evaluate
 them.

 The trick is, there's no way you or I can adequately evaluate an
encryption
 algorithm for anything but speed. Therefore, you need to choose algorithms
 that have been tested by cryptanalysis experts (which is why public
 algorithms are so important).

 All information below has been at least partially obtained from "Applied
 Cryptography" by Bruce Schneier. The book includes C source-code for
several
 algorithms, including Blowfish, DES and IDEA. Highly reccommended if you
 have any interest in cryptography.

 For Hashes:
 MD5 is still the standard almost everyone uses, though SHA and RIPE-MD are
 probably more secure.

 For Symmetric-Key Block Ciphers:
  I like using Blowfish, it's public domain, and quite fast on 32-bit
 processors. It has been used in a few commercial products.
  The TwoFish algorithm is showing a lot of promise in the competition for
 replacement of DES as the US Government standard. Other than that, I don't
 know much about it.
  IDEA is also a strong public cipher, it just never seemed to gain much
 popularity. I'd be very comfortable using it.
  Three-round DES is still fine for most uses, and has the advantage of
being
 available in public libraries. Single-round DES should not be used for
 anything more valuable than your favorite cookie recipe.

 For Symmetric-Key Stream Ciphers:
  Stream ciphers are notably less secure than block ciphers, and are
 generally only recommended for things like real-time streaming of data
where
 encrypting a "block" at a time is not practical (IE: hardware
 implementations of "scramblers" for radio, etc...).
  RC4 is commonly used, though it is not truly public, and use of it might
 get you into conflict with RSA Data Security.
  All the other stream ciphers I've seen are described as highly insecure.
 Remember that these algorithms 

Re: decrypt form variable... WAY more than you wanted to know.

2000-05-21 Thread David Cummins

Hi Mike,

Firstly I would point out that I don't know the actual algorithms for most of
the methods we are discussing, so if a comment seems a bit off hand - well, it
probably is. ;)

Mike Sheldon wrote:
 
 IDEA has been shown to have some weak keys. However, the odds of you
 actually choosing such a key are nearly non-existent (The weak keys fall
 into a certain pattern which doesn't fit any normal password.) The odds of
 choosing one randomly are 1 in 2^96. There is also an XOR value that can be
 run against keys that will completely eliminate the possibility of producing
 a weak key.

But if some weak keys can be shown to exist, can we be sure that there isn't a
whole new class of weak keys that are so far undiscovered? If an algorithm has
weak keys which are an obvious by-product of the mathematical description, and
can be easily avoided, that is one thing, but unpredictably weak keys could be
disastrous.

 RC5 is relatively untested at this point, and is therefore of unknown
 security. Also, RSA has applied for patent on RC5, so it's not available for
 use without license. (This will also likely discourage further attempts to
 test it by the experts.)

I've seen a document on both linear and differential attacks on RC5, and it
seemed fairly convincing. It seems that out of the three operations involved
(addition, xor and rotation), two of them have incompatible linear analysis
techniques, and a different two of them have incompatible differential formulae.
So far distributed.net seems to be chugging along at about as slow a rate as one
would expect.

On the other hand, I'm not so keen on the whole licensing thing... ;)

 Using a block cipher in place of a stream cipher does not make it a stream
 cipher. :) It's still a block cipher. The lesson here is that unless you are
 dealing with "continual real-time transmission" of data, stream ciphers are
 not called for. (Even many transmission situations do not call for stream
 ciphers, ie. SSL and IPsec, which use block ciphers.)

When you are talking about stream ciphers, are you thinking bit streams? In that
case... well, the start of the message seems almost doomed to be easy to crack
because there's an insufficient number of message combinations if you can only
take historical parts of the data into account.

 Undoubtedly, my favorite is Blowfish. I've used it, it performs very well,
 source-code is readily available (www.counterpane.com), there are is known
 crytanalysis against non-reduced-round Blowfish, and there are no licensing
 issues.
 
 Note that 16-round Blowfish (standard) is more than twice as fast as
 16-round RC5, and 20-round Blowfish is still almost twice as fast. In order
 to beat 20-round Blowfish, you would have to drop to 8 rounds of RC5. (RC5
 is a real dog, though not as slow as DES) Note that Twofish is slightly
 faster than Blowfish, even though it has a 128 bit block size vs. the 64 bit
 block size of Blowfish and RC5.

I'm actually surprised that Blowfish is faster, because the RC5 inner loop is
pretty damn simple. Is there a site about the algorithm anywhere that you know
of? Incidentally, RC5 _is_ expandable to whatever block size you like. Does the
same apply to Blowfish?

 Some more info on Twofish:
 
 Twofish is from the same people who brought you Blowfish. (Bet you'd never
 have guessed!) It is their submission for the Advanced Encryption Standard
 (AES) which will replace DES. Currently, it is one of five finalists from an
 original group of fifteen. It is unpatented, source code is uncopyrighted,
 and is available for use without license. (code can be downloaded from
 www.counterpane.com) It's also one of the most tested algorithms out there,
 since the competition is banging on it to try to prove it unsuitable, in
 favor of their own algorithms.

Thanks for the info, I don't have time to keep track of developments in the
encryption field these days... ;)

David
--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.



Re: decrypt form variable... WAY more than you wanted to know.

2000-05-21 Thread Stephen M. Aylor

Maybe this interests you:..?

http://www.granularity.net/technologies/

[EMAIL PROTECTED]

GIACloakTM Allaire ColdFusion extension allowing for strong encryption

giaCryptoTM Java classes to allow for encryption via Allaire ColdFusion

All the best,

Stephen M. Aylor
Aylor Insurance Agency, Inc.
"Specialized Insurance for IT - We Cover IT"
[EMAIL PROTECTED]
949.581.2333 (v)
949.581.2814 (f)




 Thanks Mike and David for the discussion.  It's not WAY more than I wanted
 to know, but I could use some help in applying all my new found knowledge
;-)

 Should I be using CFHASH for has hashing?  I've heard lots of criticism of
 CFENCRYPT, but I don't remember seeing any for CFHASH.  Do you know if it
 uses MD5, SHA, and RIPE-MD, or something else?  If not CFHASH, then can
you
 recommend a CF implementation for hashing?

 Is there a CF version of Blowfish do can recommend?  I saw the 12
 implementations of blowfish at
 http://www.counterpane.com/blowfish-download.html, but I don't know how to
 integrate any of them with CF, other than maybe writing a CFX tag, which I
 don't know how to do.  I also found CF_ENCRYPT by Jim Fuller in the tag
 gallery ($150), but thought there might be a free CF version somewhere.

 Finally, what does "non-reduced-round" mean when you said "here are is
 known crytanalysis against non-reduced-round Blowfish"  Is this 20 round?

 thanks,

 Gregory M. Saunders, Ph.D.
 Senior Design Architect
 Cognitive Arts Corporation (http://www.cognitivearts.com)
 120 S. Riverside Plaza, Suite 1520
 Chicago, IL 60606


--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.



RE: decrypt form variable... WAY more than you wanted to know.

2000-05-21 Thread Mike Sheldon

I *think* CFHASH is using MD5, but I really don't know.

These discussions have me considering writing an encryption tag myself.
Export regs have discouraged me from attempting this previously. However,
with the new regs, I may go ahead and do it now. If I do it, it will not be
commercial. All of my tags are free.

Standard Blowfish is 16 rounds. There is a cryptanalysis that has been shown
effective for up to five rounds, but that attack vector "disappears" at 6
rounds or more. (This is pretty typical for most algorithms.)

Michael J. Sheldon
Internet Applications Developer
Phone: 480.699.1084
http://www.desertraven.com/
PGP Key Available on Request

-Original Message-
From: Greg Saunders [mailto:[EMAIL PROTECTED]]
Sent: Sunday, May 21, 2000 06:05
To: [EMAIL PROTECTED]
Subject: RE: decrypt form variable... WAY more than you wanted to know.


Thanks Mike and David for the discussion.  It's not WAY more than I wanted
to know, but I could use some help in applying all my new found knowledge
;-)

Should I be using CFHASH for has hashing?  I've heard lots of criticism of
CFENCRYPT, but I don't remember seeing any for CFHASH.  Do you know if it
uses MD5, SHA, and RIPE-MD, or something else?  If not CFHASH, then can you
recommend a CF implementation for hashing?

Is there a CF version of Blowfish do can recommend?  I saw the 12
implementations of blowfish at
http://www.counterpane.com/blowfish-download.html, but I don't know how to
integrate any of them with CF, other than maybe writing a CFX tag, which I
don't know how to do.  I also found CF_ENCRYPT by Jim Fuller in the tag
gallery ($150), but thought there might be a free CF version somewhere.

Finally, what does "non-reduced-round" mean when you said "here are is
known crytanalysis against non-reduced-round Blowfish"  Is this 20 round?

thanks,

Gregory M. Saunders, Ph.D.
Senior Design Architect
Cognitive Arts Corporation (http://www.cognitivearts.com)
120 S. Riverside Plaza, Suite 1520
Chicago, IL 60606


--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or
send a message to [EMAIL PROTECTED] with 'unsubscribe' in
the body.

--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.



RE: decrypt form variable... WAY more than you wanted to know.

2000-05-21 Thread Mike Sheldon

Not very much info there...

Michael J. Sheldon
Internet Applications Developer
Phone: 480.699.1084
http://www.desertraven.com/
PGP Key Available on Request

-Original Message-
From: Stephen M. Aylor [mailto:[EMAIL PROTECTED]]
Sent: Sunday, May 21, 2000 08:23
To: [EMAIL PROTECTED]
Subject: Re: decrypt form variable... WAY more than you wanted to know.


Maybe this interests you:..?

http://www.granularity.net/technologies/

[EMAIL PROTECTED]

GIACloakTM Allaire ColdFusion extension allowing for strong encryption

giaCryptoTM Java classes to allow for encryption via Allaire ColdFusion

All the best,

Stephen M. Aylor
Aylor Insurance Agency, Inc.
"Specialized Insurance for IT - We Cover IT"
[EMAIL PROTECTED]
949.581.2333 (v)
949.581.2814 (f)




 Thanks Mike and David for the discussion.  It's not WAY more than I wanted
 to know, but I could use some help in applying all my new found knowledge
;-)

 Should I be using CFHASH for has hashing?  I've heard lots of criticism of
 CFENCRYPT, but I don't remember seeing any for CFHASH.  Do you know if it
 uses MD5, SHA, and RIPE-MD, or something else?  If not CFHASH, then can
you
 recommend a CF implementation for hashing?

 Is there a CF version of Blowfish do can recommend?  I saw the 12
 implementations of blowfish at
 http://www.counterpane.com/blowfish-download.html, but I don't know how to
 integrate any of them with CF, other than maybe writing a CFX tag, which I
 don't know how to do.  I also found CF_ENCRYPT by Jim Fuller in the tag
 gallery ($150), but thought there might be a free CF version somewhere.

 Finally, what does "non-reduced-round" mean when you said "here are is
 known crytanalysis against non-reduced-round Blowfish"  Is this 20 round?

 thanks,

 Gregory M. Saunders, Ph.D.
 Senior Design Architect
 Cognitive Arts Corporation (http://www.cognitivearts.com)
 120 S. Riverside Plaza, Suite 1520
 Chicago, IL 60606



--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or
send a message to [EMAIL PROTECTED] with 'unsubscribe' in
the body.

--
Archives: http://www.eGroups.com/list/cf-talk
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=listsbody=lists/cf_talk or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.