Bridge

1999-06-22 Thread Anonymous

The following is a message I originally posted to coderpunks. The article
it refers to can be found at
http://www.iacr.org/newsletter/curr/bridge.html

The last IACR newsletter mentions that bridge tournaments are having
trouble generating random deck shuffles, and suggests that the
cryptographic community should in a show of good faith (and, in my
opinion, a display of competence,) help them out.

The most interesting thing about the threat model mentioned for bridge
shuffles is that there is mention of allegations of manipulations to
ensure that there are ample opportunities for both north-south and
east-west, which is very much not in the spirit of the game. This shoves
the threat model into the same category as digital picking of lottery
numbers - it is necessary not only that it be random, but that outside
parties be able to ensure it's randomness.

I believe there is significant published literature on picking of lottery
numbers, but I will give my thoughts on it anyway.

Essentially what's needed is the creation of a single seed. To keep a
single party from manipulating that seed it's necessary for it to be a
composite of randomly chosen seeds from several different counterparties,
done in such a way that any conspiracy of counterparties which misses even
a single one will be incapable of any manipulations.

The simplest way of generating a composite key is to have all
counterparties which participate in seed creation generate their own
random seeds and then xor the results. Doing this verbatim results in a
potential attack in which a counterparty manages to see all other
counterparties's seeds before sending in their own. That can be fixed by
requiring all counterparties to pre-publish the secure hash of their seeds
in a highly public and pre-specified manner, such as putting them on a web
page.

That technique works, but it introduces a potentially herculean task of
keeping track of who published what seeds and for what hands of what
tournaments. That can be fixed by requiring that all seeds be the result
of taking a secure hash of a message describing what they're used for. An
example of such a message might be 'this is the seed message from the
chicago player's bridge club for use in the tournament held in sydney on
august 11, 1999 hand #4, some entropy generated by banging on the keyboard
is: snaoteuhsaoedu, some entropy spat out by my computer's random number
generator is: .lcrid;qzkidrl, the current time is january 3, 1999 12:45 pm
and this generation was done by John Smith.' (my apologies if my fake
bridge vernacular sounds hopelessly inaccurate.)

I believe that technique makes the clerical task of tracking seeds
manageable. The number of times the process needs to be run makes a
human-readable format perfectly reasonable, and doing so adds a
considerable amount of flexibility for altering the requirements of what
be stated in it as processes are modified. In exchange for requiring human
intervention, the need for scrupulous tracking of what seed value goes to
what hand is done away with. In particular repetition of hands across
tournaments is made easily avoidable - a disaster which has actually
happened.

Happily, all the technology I mention here is freely exportable from the
united states.

It is interesting to note that the bit of analysis in the IACR newsletter
said much about how to use the seed to generate a hand and nothing about
the threat model, while I said much about threat model and nothing about
how to use the seed to generate a hand. I will say, however, that feeding
the seed into a pseudo random number generator which isn't
cryptographically secure would be just plain stupid.

-Bram

(yes I use a dvorak layout)





Re: personal encryption? (fwd)

1999-06-22 Thread Anonymous

--
At 04:39 PM 6/22/99 -0400, Dan Geer wrote:
>
>Do you imply having a machine with PCR's for some unique 
>string in the authenticator's DNA?  I see two problems. 
>First, twins.  Second, it's possible to grow DNA from 
>fingernail clippings, hair, etc.  It would be like 
>habitually writing your password down on everything you 
>touched :-)
>
> 1. quoting Schneier verbatim, "BIOMETRICS ARE NOT SECRETS"
>2. for the ordinary Joe, never understimate the lure of
> convenience

There are a host of cool little computers on a button that 
can do public key operations.  They can fit on a key ring, 
and some of them on a pinky ring.  They can be used to open 
electronically controlled doors for secure access.

The great weakness of these wonderful gadgets is that they 
cannot tell the user what he is signing, or what he is 
decoding.

For this to be truly secure, the hardware in the computer 
that talked to the button would have have its ROM code take 
over the computer display to display to the user what he was 
signing, or what he was decoding.

Trouble is, it would still need to use the same video drivers 
as everyone else, but it is likely to be kind of hard to 
deploy a trojan video driver, as most operating systems, for
example NT, have special case arrangements for installing
video drivers.

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 U20SaZ235QUB5lUnY24ItVsiUbFEzExg6PPMj8V+
 489/PK+GY0K4sifcQETcgjkW0sBCGhdVpVz7Tdvyz




Re: personal encryption? (fwd)

1999-06-22 Thread Dan Geer


Do you imply having a machine with PCR's for some unique string in the
authenticator's DNA?  I see two problems.  First, twins.  Second, it's
possible to grow DNA from fingernail clippings, hair, etc.  It would
be like habitually writing your password down on everything you
touched :-)

1. quoting Schneier verbatim, "BIOMETRICS ARE NOT SECRETS"
2. for the ordinary Joe, never understimate the lure of convenience

--dan




[ANNOUNCE] PureTLS: A free Java TLS implementation

1999-06-22 Thread Eric Rescorla

http://www.rtfm.com/puretls/

Claymore Systems, Inc. is pleased to announce the availability of
PureTLS 0.9a1. PureTLS is a free pure Java implementation of TLS and
SSLv3. This is the initial release of PureTLS, and we consider the
code quality to be late Alpha. That is to say, it's undergone some
testing, including interoperability testing with OpenSSL, and we think
it's a useful product, but there are certainly still bugs.

We expect to produce a beta-quality release by the end of 
July, but to do that we need people to try it and send
us bug reports.

PureTLS is released under a BSD-style license. Quite simply, we 
feel that basic network security should be a commodity, and this is
our contribution to that end.

Ciphers supported are:
TLS_DHE_DSS_WITH_DES_CBC_SHA   
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_DES_CBC_SHA
TLS_RSA_WITH_RC4_128_MD5
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_EXPORT_WITH_RC4_40_MD5
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA

Client authentication is supported both for DSS and RSA.

For details and to download, see:
http://www.rtfm.com/puretls/

Please note that this software was developed in the US. It is
export controlled.

Moreover, RSA is patented in the US until mid-2000. As PureTLS gets
its RSA implementation from Cryptix, this isn't an issue for
distribution, but if you wish to use RSA inside the US, please see
RSA DSI for licensing terms.

Please feel free to distribute this message to other appropriate
mailing lists.


-Ekr

[Eric Rescorla   [EMAIL PROTECTED]]






CHES Accepted Papers

1999-06-22 Thread Anonymous


We are pleased to announce the following papers will appear at
the Workshop on Cryptographic Hardware and Embedded Systems.
Information about the conference is found at 
http://ece.wpi.edu/Research/crypt/ches.

A. Shamir
Factoring large numbers with the TWINKLE device

J. H. Silverman.
Fast multiplication in finite fields GF(2^n)

B. Kaliski and M. Liskov
Efficient finite field basis conversion involving dual bases

H. Wu, M. A. Hasan, and I. F. Blake.
Highly regular architectures for finite field computation using 
redundant basis

H. Wu
Low complexity bit-parallel finite field arithmetic using polynomial 
basis

K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara
Fast implementation of public-key cryptography

P. J. Lee, E. J. Lee, and Y. D. Kim
How to implement cost-effective and secure public key cryptosystems

J. Lopez and R. Dahab
Fast multiplication on elliptic curves over GF(2^m) without 
precomputation

L. Gao, S. Shrivastava, and G. E. Sobelman
Elliptic curve scalar multiplier design using FPGAs

Y. Han, J. Zhang, and P.-C. Tan
Direct computation for elliptic curve cryptosystems

J.-S. Coron
Resistance against differential power analysis attacks for 
elliptic curve cryptosystems

L. Goubin and J. Patarin
DES and differential power analysis

P. Fahn and P. Pearson
IPA: A new class of power attacks

T. S. Messerges, E. A. Dabbish, and R. H. Sloan
Power analysis attacks of modular exponentiation in smartcards

H. Handschuh, P. Paillier, and J. Stern
Probing attacks on tamper-resistant devices

V. Bagini and M. Bucci
A design of reliable true random number generator for 
cryptographic applications

D. Maher and B. Rance
Random number generators founded on signal and information theory

W. P. Choi and L. M. Cheng
Modelling the crypto-processor from design to synthesis

R. R. Taylor and S. C. Goldsteiny
A high-performance flexible architecture for cryptography

A. F. Tenca and C. K. Koc
A scalable architecture for Montgomery multiplication

E. Mosanya, C. Teuscher, H. F. Restrepo, P. Galley, and E. Sanchez
CryptoBooster: A reconfigurable and modular cryptographic coprocessor

I. Hamer and P. Chow
DES cracking on the Transmogrifier 2a

M. Hartmann, S. Paulus, and T. Takagi
NICE - New Ideal Coset Encryption -

D. C. Wilcox, L. G. Pierson, P. J. Robertson, and E. L. Witzke
A DES ASIC suitable for network encryption at 10 Gbps and beyond

E. Hong, J.-H. Chung, and C. H. Lim
Hardware design and performance estimation of the 128-bit block 
cipher cRYPTON

T. Horvath
Arithmetic design for permutation groups

O. Jung and C. Ruland
Encryption with statistical self-synchronization in synchronous 
broadband networks

Invited Talks:
--

Brian Snow, National Security Agency, USA
We Need Assurance

Eberhard von Faber, Debis IT Security Services, Germany
Security Evaluation Schemes for the Public and Private
Market with a Focus on Smart Card Systems

Dale Hopkins, Compaq - Atalla, USA
Design of Hardware Encryption Systems for e-Commerce Applications

Colin D. Walter, Computation Department - UMIST, U.K.
An Overview of Montgomery's Multiplication Technique:
How to make it Smaller and Faster

David Naccache, Gemplus, France
Significance Tests and Hardware Leakage

---
Workshop on Cryptographic Hardware and Embedded Systems
 Worcester, Massachusetts, August 12-13, 1999
---
Information:http://ece.wpi.edu/Research/crypt/ches
E-Mail: [EMAIL PROTECTED]
Program Chairs: Cetin Kaya Koc   & Christof Paar
[EMAIL PROTECTED] & [EMAIL PROTECTED]
---






Re: personal encryption? (fwd)

1999-06-22 Thread Marc Horowitz

Dan Geer <[EMAIL PROTECTED]> writes:

>> this does not lead to secret messages.
>> 
>> this leads to the ultimate in biometrics.

Do you imply having a machine with PCR's for some unique string in the
authenticator's DNA?  I see two problems.  First, twins.  Second, it's
possible to grow DNA from fingernail clippings, hair, etc.  It would
be like habitually writing your password down on everything you
touched :-)

Marc



CipherClerk

1999-06-22 Thread Udhay Shankar N

CipherClerk is a Java applet "implementing a collection of historic
ciphers. Most ciphers are "paper & pencil" types, e. g. to use them you
wouldn't need more than a sheet of paper and something to write."

http://members.magnet.at/users/wilhelm.m.plotz/

Udhay
-- 
 __ 
 http://www.unimobile.com/  http://pobox.com/~udhay  
  sign up for the Unimobile beta today!



Re: Justice Dept asks Court of Appeals to reconsider ruling in Bernstein case

1999-06-22 Thread Steven M. Bellovin

In message <[EMAIL PROTECTED]>, Declan McCullagh wri
tes:
> I have a more detailed report on Wired News:
> 
>   http://www.wired.com/news/news/politics/story/20333.html
> 
> My favorite part of the brief (I quote it):
> 
> >
> > Another argument: That this type of 
> > regulation is an executive-branch policy 
> > decision involving "extraordinarily 
> > sensitive" info that's too secret to 
> > disclose publicly.

Gee -- did they happen to mention that the CRISIS report concluded that
the question could be discussed without reference to classified info?





Re: Justice Dept asks Court of Appeals to reconsider ruling in Bernstein case

1999-06-22 Thread Declan McCullagh

I have a more detailed report on Wired News:

  http://www.wired.com/news/news/politics/story/20333.html

My favorite part of the brief (I quote it):

>
> Another argument: That this type of 
> regulation is an executive-branch policy 
> decision involving "extraordinarily 
> sensitive" info that's too secret to 
> disclose publicly. "Judicial review is 
> particularly unworkable [since] decisions 
> always involve an appraisal of the 
> potential impact of proposed encryption 
> exports on the government's [signals 
> intelligence] and cryptoanalysis 
> capabilities." 


The brief also talks about how the case affects NSA SIGINT capability.

-Declan


At 07:26 PM 6-21-99 -0400, Steven M. Bellovin wrote:
>According to the AP, the Justice Department has asked the 9th Circuit Court
>of Appeals to reconsider its decision in the Bernstein case 
>(http://www.nytimes.com/aponline/w/AP-Encryption.html).  The article didn't
>say so, but I assume that they've asked for a rehearing by the full
>court, instead of just a three-judge panel.
>  



RE: Could Open Source Software Help Prevent Sabotage? (fwd)

1999-06-22 Thread Damien Miller

On Mon, 21 Jun 1999, Michael Cervantes wrote:

> Most open source software is distributed in a tar file with just makefiles,
> docs, and source.  You compile the object directly from the source code that
> is provided.  However, binary packages are becoming more common as package
> management apps like Redhat's RPM become ubiquitous, and it is important
> that sys admins recognize the significance of this.

RPMs and other modern binary package formats include signatures 
(PGP in RPM's case). 

In most cases you can also obtain source packages. In RPM's case
a source package consists of a "pristine" source archive, zero or 
more patches to the the source and a "spec" file which describes
the package and build procedure.

Having the modification seperate from the original source, and 
thus the ability to verify the integrity of the original source
helps quite a bit.

Regards,
Damien Miller 

--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.ilogic.com.au/~dmiller
| Email: [EMAIL PROTECTED] (home) -or- [EMAIL PROTECTED] (work)




Re: Justice Dept asks Court of Appeals to reconsider ruling in Bernstein case

1999-06-22 Thread Greg Broiles

On Mon, Jun 21, 1999 at 07:26:11PM -0400, Steven M. Bellovin wrote:

> According to the AP, the Justice Department has asked the 9th Circuit Court
> of Appeals to reconsider its decision in the Bernstein case 
> (http://www.nytimes.com/aponline/w/AP-Encryption.html).  The article didn't
> say so, but I assume that they've asked for a rehearing by the full
> court, instead of just a three-judge panel.

They've asked for both, which is how this sort of thing works. 

They advance two arguments in their petition -

"The EAR's Export Controls on Encryption Source Code Are Not a Facially
Unconstitutional Prior Restraint"

(arguing that the crypto export controls aren't targeted at expressive
activity, and hence not properly subject to a facial challenge on prior
restraint grounds)

and

"The Export Controls on Encryption Source Code are Severable From the
Export Controls on other Encryption Products". 

(arguing that the Supreme Court, in _ACLU v. Reno_ 117 S.Ct. 2329,
establishes that it is appropriate for a court to sever part of a
statute or regulation where there is a "textual manifestation" of a
distinction between constitutional and unconstitutional regulation.)

--
Greg Broiles
[EMAIL PROTECTED]