Re: [cryptography] Can there be a cryptographic dead man switch?

2012-09-19 Thread The Fungi
On 2012-09-19 17:01:02 -0400 (-0400), mhey...@gmail.com wrote:
[...]
  If I should die, I will stop re-encrypting the secret and the trustee
  (that I never really trusted) can break the public key and get to the
  secret.
[...]

And how does the trustee get access to the encrypted form of the
secret? If he has a copy of it encrypted with the old key, how do
you ensure he throws it out when you reencrypt with the new key? If
he doesn't get access to the encrypted secret until you die, then
why not simply rely on that access mechanism and forget about
encrypting it in the first place?
-- 
{ IRL(Jeremy_Stanley); WWW(http://fungi.yuggoth.org/); PGP(43495829);
WHOIS(STANL3-ARIN); SMTP(fu...@yuggoth.org); FINGER(fu...@yuggoth.org);
MUD(kin...@katarsis.mudpy.org:6669); IRC(fu...@irc.yuggoth.org#ccl); }
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] non-decryptable encryption

2012-06-20 Thread The Fungi
On 2012-06-20 09:54:33 -0700 (-0700), Givonne Cirkin wrote:
 curious, why don't some ppl trust link shortners? is that a
 generation gap thing.
 
 2nd. ur guesses are wrong. i was born in the USA. my parents were
 born in the USA. my native language is English.
[...]

Perhaps this is also a generation gap thing. Professionals of my
generation converse with colleagues and peers by using complete
sentences and well-structured grammar. That same generation also
prefers canonical URIs and other accurate bibliographical
references/citations. I've been out of academia for a while, so
perhaps the major journals have begun to accept submissions via SMS?

To echo other responses on the paper, the biggest objection (aside
from the minimal novelty of the subject matter itself) is likely to
revolve around your non-decryptable terminology. Your method is
clearly not non-decryptable to the owner or intended recipient who
possesses the key/pad with which the data was encrypted, or else it
would be useless. Further, no encryption technique is particularly
useful when decryptable by unintended agents. As a result the term
adds nothing meaningful in context, being either a logical
contradiction or tautology (depending on your intended connotation).
-- 
{ IRL(Jeremy_Stanley); WWW(http://fungi.yuggoth.org/); PGP(43495829);
WHOIS(STANL3-ARIN); SMTP(fu...@yuggoth.org); FINGER(fu...@yuggoth.org);
MUD(kin...@katarsis.mudpy.org:6669); IRC(fu...@irc.yuggoth.org#ccl); }
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Is this as ominous as it sounds like? (It SOUNDS ominous as Hell - but maybe it isn't)

2012-05-07 Thread The Fungi
On 2012-05-07 12:53:14 -0400 (-0400), Randall Webmail wrote:
[...]
 The Internet Kill Switch; With Global Wiretapping Capability?
[...]

I consider myself a paranoid nut, but that's a little far fetched
even for me. I'd take the time to write up everything that's off
base with it (from the perspective of working for an ISP and DNS
host), but it looks like someone already beat me to the punch:

   
http://metabunk.org/threads/561-Debunked-Markmonitor-com-The-Internet-Kill-Switch-Wiretapping

A fun flight of fancy nevertheless.
-- 
{ IRL(Jeremy_Stanley); WWW(http://fungi.yuggoth.org/); PGP(43495829);
WHOIS(STANL3-ARIN); SMTP(fu...@yuggoth.org); FINGER(fu...@yuggoth.org);
MUD(kin...@katarsis.mudpy.org:6669); IRC(fu...@irc.yuggoth.org#ccl); }
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] trustwave admits issuing corporate mitm certs

2012-02-28 Thread The Fungi
On 2012-02-26 15:45:34 -0600 (-0600), Marsh Ray wrote:
[...]
 So if the online banking site required TLS client authentication
 with smart cards with on-chip RSA, the situation would be much
 different. A MitM who succeeded in impersonating the site to the
 user would be unable to replay or forward the user's credentials. In
 theory, the user could not be socially engineered out of his
 credentials (short of physically handing over his smart card).
[...]

Your login was successful, but due to recent security concerns we
also require a one-time verification of your personal information.
Please now enter the following...

 * Checking Account Number
 * Bank Routing Number
 * ATM Card Number
 * Card Expiraion Date
 * CCV Number
 * Full Name
 * Billing Address
 * Social Security Number
 * Drivers License Number

Thank you for your cooperation. Please click here to log out and
back in again. [hyperlink to actual impersonated site]

So sure, maybe not socially engineered out of his online banking
credentials, just possibly everything else the attacker might want
in lieu of access to the banking portal itself. Mutual
authentication could thwart this if implemented well in a way which
was very visible to the user, but also might not if implemented
poorly (and it's not like banks are leading the way in
well-thought-out authentication technologies, after all).

Also working against this is that it's more expensive for banks to
step up authentication past the level which government regulators
consider to no longer be grossly negligent. Beyond there it's likely
cheaper in the long run for banks to refund disputed transactions
and replace compromised accounts (or wait for victims to get
frustrated and give up/leave in disgust).
-- 
{ IRL(Jeremy_Stanley); WWW(http://fungi.yuggoth.org/); PGP(43495829);
WHOIS(STANL3-ARIN); SMTP(fu...@yuggoth.org); FINGER(fu...@yuggoth.org);
MUD(kin...@katarsis.mudpy.org:6669); IRC(fu...@irc.yuggoth.org#ccl); }
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] this house believes that user's control over the root list is a placebo

2011-06-26 Thread The Fungi
On Sun, Jun 26, 2011 at 12:26:40PM -0500, Marsh Ray wrote:
[...]
 Now maybe it's different for ISP core router admins, but the
 existence of this product strongly implies that at least some admins
 are connecting to their router with their web browser over HTTPS and
 typing in the same password that they use via SSH.
[...]

Valid point, but flawed example. Managing these things day in and
day out, I can tell you this is the first thing any experienced
admin disables when initially configuring the device. If your admin
is managing your routers with a Web interface, SSL MitM is the
*least* of your worries, honestly.
-- 
{ IRL(Jeremy_Stanley); WWW(http://fungi.yuggoth.org/); PGP(43495829);
WHOIS(STANL3-ARIN); SMTP(fu...@yuggoth.org); FINGER(fu...@yuggoth.org);
MUD(kin...@katarsis.mudpy.org:6669); IRC(fu...@irc.yuggoth.org#ccl);
ICQ(114362511); YAHOO(crawlingchaoslabs); AIM(dreadazathoth); }
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Micro-SD card encrypts voice on mobile phones

2010-12-02 Thread The Fungi
On Thu, Dec 02, 2010 at 04:36:51PM -0500, Steven Bellovin wrote:
 That's 521 bits for the ECC part, as I read it. An odd size, even
 there?
[...]

...there is no 512-bit curve defined, but only one with a 521-bit
length...--IETF RFC 5639
-- 
{ IRL(Jeremy_Stanley); WWW(http://fungi.yuggoth.org/); PGP(43495829);
WHOIS(STANL3-ARIN); SMTP(fu...@yuggoth.org); FINGER(fu...@yuggoth.org);
MUD(kin...@katarsis.mudpy.org:6669); IRC(fu...@irc.yuggoth.org#ccl);
ICQ(114362511); YAHOO(crawlingchaoslabs); AIM(dreadazathoth); }
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography