Re: RSA's RC5-64 Secret Key Challenge has been solved.

2002-09-27 Thread Ralf-P. Weinmann

On Thu, Sep 26, 2002 at 02:45:12PM -0700, John Gilmore wrote:
 [...]
 
 After getting that getting started, though, I suggest beginning a
 brute-force attack on the GSM cellphone encryption algorithm.  That's
 in use in hundreds of millions of devices worldwide, protecting (or
 failing to protect) the privacy of billions of phone calls a day.

Is A5/3 deployed yet? If not, a brute force attack is not needed, for A5/1 and
A5/2 more efficient tools exist to cryptanalyse it. Even in real-time, although
you might need to invest in some hard disk space before being able to eavesdrop
and intercept. See the following paper for more information:

A. Biryukov, A. Shamir and D. Wagner, Real Time Cryptanalysis of A5/1 on a PC

As for A5/3, I'm not really sure what key length network operators are/will be
using, 64-128 bits are allowed in the design requirements documentation. The
specification should be available on the 3GPP website. A5/3 is based on Kasumi.

Cheers,
Ralf

-- 
Ralf-P. Weinmann [EMAIL PROTECTED]
PGP fingerprint: 2048/46C772078ACB58DEF6EBF8030CBF1724

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



FlexiProvider 1.1.1 released

2002-02-12 Thread Ralf-P. Weinmann

Release announcement: FlexiProvider version 1.1.1
=

FlexiProvider - Harnessing the power of the Java Cryptography Architecture
http://www.flexiprovider.de

The FlexiProvider group is pleased to announce the availability of version
1.1.1 of our open source toolkit for the JCA/JCE. The FlexiProvider toolkit
was previously known as cdcProvider, however in late 2001, our research
group decided to change the name of the toolkit.

Several significant changes have occured since the last release of the
provider, which was the cdcProvider 1.9.1:

* The Standard Provider has been renamed to Core Provider.

* The message digest SHA-1 was optimized for better performance.

* Since NTT no longer supports the adoption of the E2 cipher, we decided
  to drop it in the current release of the Core Provider.

* The mode classes for the symmetric ciphers were rewritten. This resulted
  in a higher throughput for these ciphers.

* Design changes werde made to the class BasicCipher, which mode classes
  and padding classes interoperate with.

* The EC provider now supports both GF(p) and GF(2n) arithmetic.

* Furthermore, support for ECElGamal was dropped for security reasons
  and is now superseded by the integrated encryption scheme ECIES.

* Support for the Diffie-Hellmann key exchange protocol ECDH was added
  as well as the Nyberg-Rueppel style signature scheme ECNR.

* The block cipher SAFER++ (a NESSIE candidate) has been implemented and
  is available in the Core Provider.

* The Number Field Provider, wich formerly was being announced but then
  withheld from the public, has now been released in an alpha-beta version. 

* Bugs impairing the functionality of the provider were found and fixed in
  the Asymmetric ECB, RSA PKCS #1 v1.5 and v2.1 cipher as well as in the
  RSA PKCS #1 v1.5 signature classes.

As numerous bugs have been fixed we recommend users of the cdcProvider upgrade
to the latest version of the FlexiProvider as soon as possible.


Regards,
The FlexiProvider group

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]