ENC: Review of Cryptanalysis book?

2003-04-04 Thread Mads Rasmussen

Remember I asked some time ago about a review for Samuel Wagstaff's
recent book on cryptanalysis of number theoretic ciphers?

I still haven't found any, but I wrote to Samuel to ask him if he knew
if any existed.

Below I have, with his permission, copied his answer.

Regards,

Mads

-Mensagem original-
De: Samuel S Wagstaff [mailto:[EMAIL PROTECTED] 
Enviada em: quarta-feira, 2 de abril de 2003 17:44
Para: Mads Rasmussen
Assunto: Re: Review of Cryptanalysis book?

Dear Mads,

In fact I have not seen a review of my book yet.  I think it
is too soon for one to be published, although I expect that
reviews of it are being prepared.

If I wrote a review, of course it would be favorably biased
and so not much use to you.

An announcement (flyer) describing the book is available at the
URL <http://www.cerias.purdue.edu/homes/ssw/contc/index.html>

Part of the Preface to the book is appended to this note.
Perhaps that will satisfy your employer.

Sincerely,

Sam Wagstaff

--

>From the Preface of Cryptanalysis of Number Theoretic Ciphers:

This work has its origins in a cryptography course taught by the
author many times during the past twenty years in the Computer
Science Department at Purdue University.

Part I gives the mathematical background for cryptography as well as
some definitions and simple examples from cryptography.  The
cryptographic definitions appear in the first chapter.

The second chapter treats some topics from elementary probability
theory which are needed most for cryptanalysis.

Chapters 3 through 7 give a standard first course in elementary number
theory, but with a slant toward computation and with the needs of
cryptography always in mind.  Thus, Chapter 3, on divisibility, also
tells how to perform arithmetic with large integers and Chapter 4,
which is about primes, discusses the probability that a ``random''
large integer will have only small prime factors.  This topic is rarely
discussed in the chapter on primes in an elementary number theory book,
but is needed to estimate the difficulty of breaking certain ciphers.

Chapter 5 introduces congruences, which are used in many modern
cryptographic algorithms.  Chapter 6 proves Fermat's little theorem and
Euler's generalization of it.  These important results are used
throughout the rest of the book.  This chapter also introduces
primitive roots and discrete logarithms, which are needed for many
ciphers and protocols.

Chapter 7 deals with the solution of quadratic congruences.  We do not
prove the quadratic reciprocity law, but do explain its importance in
computation.  We state this law in a form useful for programming rather
than in the slick concise way found in many number theory texts.

Chapter 8 introduces information theory and gives examples of some
obsolete ciphers.

Chapter 9 offers a selection of topics from modern algebra that are
used in later chapters to make and break various ciphers.

Chapters 10 through 13 treat the complementary problems of factoring
large integers and identifying large primes.  Many cryptographic
algorithms begin by choosing large primes.  Some ciphers and protocols
can be broken by factoring a large integer.  Slow but nevertheless
important factoring methods are the topic of Chapter 10.  In Chapter
11, the reader learns how to tell whether a large integer is probably
prime, how to give a rigorous proof that a large number is prime, and
how to construct large primes that have an easy rigorous proof of
primality.  Chapter 12 deals with the important elliptic curve groups
used in prime proofs, in factoring integers, and directly in ciphers
and protocols.  The fastest known factoring algorithms are described in
Chapter 13.

Chapter 14 discusses the best ways to break certain ciphers by
computing ``discrete logarithms.'' We describe several good methods for
choosing random numbers in Chapter 15.  Cryptographic algorithms that
need secret random integers can be compromised if the numbers are not
sufficiently random.

Part II describes a selection of cryptographic algorithms, most of
which use number theory.  Chapter 16 presents some single-key ciphers,
in which all keys are supposed to remain secret.  Rijndael, the new
Advanced Encryption Standard, is the fastest of these ciphers.  The
Pollig-Hellman ciphers are slower, but enjoy special properties which
make them useful in certain protocols.  Chapter 17 introduces
public-key ciphers, including those of Rivest, Shamir and Adleman,
Massey-Omura, ElGamal, and Rabin-Williams.

Methods of signing messages electronically are presented in Chapter
18.  Chapter 19 explains ways for two users to exchange keys in a
secure manner, so that no one else can discover these keys by
eavesdropping on their messages, and so that the users can be sure that
they are talking to each other and not to an impersonator.

In Chapter 20 we describe simple protocols for playing games, sharing
secrets, signing documents wit

RES: Test Vectors?

2003-03-28 Thread Mads Rasmussen


> -Mensagem original-
> De: Ben Laurie [mailto:[EMAIL PROTECTED]
> Enviada em: sexta-feira, 28 de março de 2003 05:14
> Para: Cryptography
> Assunto: Test Vectors?
> 
> Does anyone have test vectors for the X19.7 PRNG (HAC p.173)?

The NIST STS PRNG test suite includes an implementation for X9.17

http://csrc.nist.gov/rng/sts-1.5.tar

look in generators/generator3.c

Mads

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


SV: REQ: Review of Nigel Smart's "Introduction to Cryptography"

2003-03-08 Thread Mads Rasmussen

Thanks, I wasn't aware of that

More info at

http://cryptography.informatik.fh-nuernberg.de/

It seems like chapters 9 and 10 are what you were referring to

Regards,

Mads

> -Oprindelig meddelelse-
> Fra: Jaap-Henk Hoepman [mailto:[EMAIL PROTECTED]
> Actually, there's the textbook "Introduction to Cryptography" 
> by Delfs and
> Knebl that covers provably secure encryption and digital 
> signatures as well.
> Published by Springer.
> 
> Jaap-Henk
> 
> On Fri, 7 Mar 2003 15:14:04 -0300 "Mads Rasmussen" 
> <[EMAIL PROTECTED]> writes:
> > Has anyone read Nigel Smart's book from late 2002, "introduction to
> > Cryptography" 
> >  
> > The latest IACR newsletter brought an overview and TOC of the book,
> > which I found interesting. It seems to me the first time provable
> > security is mentioned in a textbook (see part IV, 17 and 18)
> >  
> > As the newsletter said, more info is available at
> >  
> >  http://www.mcgraw-hill.co.uk/html/0077099877.html
> > <http://www.mcgraw-hill.co.uk/html/0077099877.html> 
> >  
> 


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


REQ: Review of Nigel Smart's "Introduction to Cryptography"

2003-03-07 Thread Mads Rasmussen
Has anyone read Nigel Smart's book from late 2002, "introduction to
Cryptography" 
 
The latest IACR newsletter brought an overview and TOC of the book,
which I found interesting. It seems to me the first time provable
security is mentioned in a textbook (see part IV, 17 and 18)
 
As the newsletter said, more info is available at
 
 http://www.mcgraw-hill.co.uk/html/0077099877.html
<http://www.mcgraw-hill.co.uk/html/0077099877.html> 
 
I would be very interested in hearing from someone that read the book on
how this material is presented. I find Bellare and Rogaway's lecture
notes magnificent but it isn't a textbook.
 
I quoted the excerpt from the IACR newsletter below for those who might
be interested
 
Regards,
 
Mads Rasmussen
 
--
 
Cryptography, An Introduction
 
   by Nigel Smart,
   McGraw-Hill, 2002.
   ISBN 0 077 09987 7 (PB).
   
   Nigel Smart's Cryptography provides the rigorous detail required for
   advanced cryptographic studies, yet approaches the subject matter in
   an accessible style in order to gently guide new students through
   difficult mathematical topics. Covering the latest developments in
   cryptography, including the Rijndael algorithm chosen for the new
   Advanced Encryption Standard, the OAEP padding system for RSA,
   elliptic curve based systems and provable security this book is a
   complete introduction to cryptography.
 
Part I Mathematical Background 
1 Modular Arithmetic, Groups, Finite Fields and Probability 
2 Elliptic Curves 
 
Part II Symmetric Encryption 
3 Historical Ciphers 
4 Information Theoretic Security 
5 Symmetric Ciphers 
6 Symmetric Key Distribution 
 
Part III Public Key Encryption and Signatures 
7 Basic Public Key Encryption Algorithms 
8 Primality Testing and Factoring 
9 Discrete Logarithms 
10 Key Exchange, Signature Schemes and Hash Functions 
11 Implementation Issues 
12 Obtaining Authentic Public Keys 
13 Protocols 
 
Part IV Security Issues 
14 Attacks on Public Key Schemes 
15 Definitions of Security 
16 Complexity Theoretic Approaches 
17 Provable Security: With Random Oracles 
18 Provable Security: Without Random Oracles 
Appendices 
Appendix A Basic Mathematical Terminology 
Appendix B Java Examples 
Index 
   
 

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


ENC: Proven Primes

2003-03-06 Thread Mads Rasmussen


> -Mensagem original-
> De: Ben Laurie [mailto:[EMAIL PROTECTED]
> Enviada em: quinta-feira, 6 de março de 2003 08:47
> Para: Cryptography
> Assunto: Proven Primes
> 
> I'm looking for a list or lists of sensibly sized proven primes - all
> the lists I can find are more interested in records, which are _way_
too
> big for cryptographic purposes.
> 
> By "sensibly sized" I mean in the range 512-8192 bits. I'm
particularly
> after Sophie Germain primes right now, but I guess all primes are of
> interest.

You might look at the IKE groups

The Internet Key Exchange (IKE) 
http://www.ietf.org/rfc/rfc2409.txt

"More MODP Diffie-Hellman groups for IKE"
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ike-modp-groups-05.
txt

Regards,

Mads

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


RES: Request: review of new Cryptanalysis book

2003-01-31 Thread Mads Rasmussen
> -Mensagem original-
> De: Anton Stiglic [mailto:[EMAIL PROTECTED]]
> Enviada em: sexta-feira, 31 de janeiro de 2003 16:50
> Para: Mads Rasmussen
> Assunto: Re: Request: review of new Cryptanalysis book
> 
> There was a small thread on sci.crypt
> 
> http://groups.google.ca/groups?hl=en&lr=&ie=UTF-8&oe=UTF-
>8&threadm=3C01F24E.89E065AC%40compuserve.com&rnum=1&prev=/groups%3Fq%3D
sci.>crypt%2BWagstaff%26hl%3Den%26lr%3D%26ie%3DUTF-8%26oe%3DUTF->8%26sel
m%3D3C01F24E.89E065AC%2540compuserve.com%26rnum%3D1
> 
> (the URL will probably break up, just stick everything together).
> 
> The only relevant reply was a speculative one by Molnar.

Thanks Anton, 

This description refers to a published contents index of the book that
the author published online (CRC press) long before the book was
published.

The comment by Molnar, however, might still be valid. That's why a
review would be nice :)

Mads

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



RES: Request: review of new Cryptanalysis book

2003-01-31 Thread Mads Rasmussen

Hmm nobody reacted to my request :(

I found this recently, not really a review, but here it goes

http://www.cerias.purdue.edu/homes/ssw/contc/C1534FL.pdf

I guess I have to cough up the 80 bucks and see for myself :o(

Mads Rasmussen
Open Communications Security
+55(11)3345-2525


> -Mensagem original-
> De: Mads Rasmussen
> Enviada em: quinta-feira, 23 de janeiro de 2003 09:16
> Para: [EMAIL PROTECTED]
> Assunto: Request: review of new Cryptanalysis book
> 
> I wonder if anyone reading this list has read the following book:
> 
> Cryptanalysis of Number Theoretic Ciphers
> by Samuel S., Jr. Wagstaff, Mikhail J. Atallah (Editor)
> ISBN: 1584881534
> CRC Press
> 
> See the following link for details
> 
>
http://www.crcpress.com/shopping_cart/products/product_detail.asp?sku=C1
> 534&parent_id=&pc=
> 
> I would appreciate any comments
> 
> Regards,
> 
> Mads Rasmussen
> Open Communications Security
> +55(11)3345-2525
> 
> 
> -
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to
> [EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Request: review of new Cryptanalysis book

2003-01-23 Thread Mads Rasmussen
I wonder if anyone reading this list has read the following book:

Cryptanalysis of Number Theoretic Ciphers
by Samuel S., Jr. Wagstaff, Mikhail J. Atallah (Editor)
ISBN: 1584881534
CRC Press

See the following link for details

http://www.crcpress.com/shopping_cart/products/product_detail.asp?sku=C1
534&parent_id=&pc=

I would appreciate any comments

Regards,

Mads Rasmussen
Open Communications Security
+55(11)3345-2525


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Chaotic encryption research being evaluated

2003-01-21 Thread Mads Rasmussen
 
Giving a recent thread on sci.crypt about chaotic encryption I thought
this seemed interesting
 
The actual paper is available from the link below
 
>From Security Wire Digest Vol 5 No 5
 
The 
 
---
*CHAOTIC ENCRYPTION RESEARCH BEING EVALUATED
By Carl Weinschenk
A new approach to chaotic encryption proposed by researchers at Beijing
Normal University has a good pedigree, but many experts are taking a
wait-and-see attitude on its speed and security.
 
Chaotic encryption employs an algorithm to transmit information in a
stream that grows increasingly disordered--or chaotic--over time. The
receiver can use the algorithm to remove the random data. This, in
essence, rolls back the clock to reveal the initial data.
 
The challenge to the commercialization of any new encryption
technique--one that chaotic encryption hasn't reached--is proving it's
as fast and secure as existing systems, such as TripleDES, says Jon
Callas, CTO of PGP Corp.
 
The research on encrypting two-way voice communications using chaotic
encryption was reported in Physical Review E. Dr. Hu Gang, who led the
research, says that the approach has commercial potential because it
uses fast "single round" analytical computations. The speed is achieved
without compromising security because the type of chaos
used--"spatiotemporal"--is highly secure. "The particular advantage with
our system is that we can produce ciphertexts in each round," he says.
 
"Professor Hu...has a very talented group of researchers and does
excellent work," says Rajarshi Roy, a professor in the Department of
Physics and the Institute for Physical Science and Technology at the
University of Maryland. "As a method of speech encoding using computer
hardware and software, this is an interesting technique, and its privacy
and security need to be studied."
 
But Janusz Szczepanski, a researcher at the Polish Academy of Sciences'
Institute of Fundamental Technological Research, says the authors have
only considered one type of attack, so the jury is still out on the
quality of this method's security.
 
"I have looked at their system and, without detailed analysis, I can
point out some points that can be attacked," says Szczepanski. He awaits
the further research that the paper's authors say is coming.
http://ojps.aip.org/getabs/servlet/GetabsServlet?prog=normal
<http://ojps.aip.org/getabs/servlet/GetabsServlet?prog=normal&id=PLEEE80
000660606520201&idtype=cvips&gifs=yes&jsessionid=339324104281771
0305>
&id=PLEEE8660606520201&idtype=cvips&gifs=yes&jsessionid=3393
241042817710305
 
---
 
Mads Rasmussen
Open Communications Security
+55(11)3345-2525
 

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]