Cryptography-Digest Digest #785

1999-06-26 Thread Digestifier

Cryptography-Digest Digest #785, Volume #9   Sun, 27 Jun 99 02:13:04 EDT

Contents:
  Re: A few questions on RSA (Gilad Maayan)
  Re: determining number of attempts required (S.T.L.)
  Re: Moores Law (a bit off topic) (david avery)
  Re: A few questions on RSA (S.T.L.)
  Re: DES-NULL attack (wtshaw)
  Re: A few questions on RSA (David A Molnar)
  Re: determining number of attempts required (JPeschel)



From: [EMAIL PROTECTED] (Gilad Maayan)
Subject: Re: A few questions on RSA
Date: Sun, 27 Jun 1999 03:54:26 GMT

Take the following encryption scenario:
A 20 bit cyphertext is encrypted into a 20 bit cyphertext using a 1024
bit RTS pubic key. The public exponent is only about 100 bits long;
the secret exponent would be around 900 (if I'm not mistaken). Anyhow,
we're talking about a drastically small public key, and a
correspondingly large secret key.

I'm assuming, in the above scenario, that all of the following are
true. Please note that I'm making a somewhat unconventional use of RTS
- I know moduluses are usually kept in the public domain, etc.

1. An attacker knowing neither the modulus nor the public key, but
knowing the exact length of the plaintext, would not be able to
extrapolate the key from the cyphertext. 

2. Let's assume the attacker knows the plaintext but not the modulus
or the public key. The key space is indeed small in this case - only
2^20 - but this only means that each 20-bit combination would have an
enormous amount of 'possible' 512/1024 keys (keys that, when used on
the plaintext, would encrypt it as the known cyphertext). Therefore,
you could test the entire keyspace (only about 1.05 million keys) to
find a key that works, but you would have no way in hell of knowing
which key was actually used.

3. Let's assume the attacker knows the plaintext, the cyphertext, the
modulus, and the secret key (not the public key). For the reasons
stated above, even though the effective key space is only 2^20, he
would have to actually break 1024-bit RTS to know the key that was
used in encryption - simply testing each one of the million-odd
possible combinations would not yield the key.
Furthermore, in our specific scenario, it would make no difference to
an attacker that the public exponent was unusually small - 1024 RTS
would be just as hard to break. 

I'd like to hear your comments on this.

Also, I have another question, which appeared in the original message
but wasn't answered to my satistfaction:
Let's say you encrypt a message with triple DES, using two keys
extrapolated from a key-seed by a function. You send the cyphered
message together with the key-seed, without encrypting the key-seed in
any way. If the functions are unknown to an attacker (forget the
key-management issues), would it be able to extrapolate them from the
key-seed and cyphertext?

Many thanks,
Gilad Maayan

--

From: [EMAIL PROTECTED] (S.T.L.)
Subject: Re: determining number of attempts required
Date: 27 Jun 1999 04:42:01 GMT

<>

I see several scenarios, increasingly interesting. I'd like to know which (if
any!) are the case, actually.

1) You've encoded something important and have forgotten the exact key.
However, certain details you stated about how fast you can try keys makes me
think that the files are on some other computer, which you can't access.

2) You've given someone else guidelines to create a password (very, very
unusual guidelines), and are now trying to crack it. Unlikely.

3) You picked a password to encode information, but have forgotten its exact
contents AND are no longer allowed actual access to the encrypted data. This is
the most interesting one.

I'm getting really curious as to what you're trying to crack open! :-D

-*---*---
S.T.L.  ===> [EMAIL PROTECTED] <===  BLOCK RELEASED!2^3021377 - 1 is PRIME!
Quotations:  http://quote.cjb.net  Main website:  http://137.tsx.orgMOO!
"Xihribz! Peymwsiz xihribz! Qssetv cse bqy qiftrz!"  e^(i*Pi)+1=0   F00FC7C8
E-mail block is gone. It will return if I'm bombed again. I don't care, it's
an easy fix. Address is correct as is. The courtesy of giving correct E-mail
addresses makes up for having to delete junk which gets through anyway. Join
the Great Internet Mersenne Prime Search at http://entropia.com/ips/  Now my
.sig is shorter and contains 3379 bits of entropy up to the next line's end:
-*---*---

Card-holding member of the Dark Legion of Cantorians, the Great SRian
Conspiracy, the Triple-Sigma Club, and the Union of Quantum Mechanics
Avid watcher of "World's Most Terrifying Causality Violations", "World's
Scariest Warp Accidents", and "When Tidal Forces Attack: Caught on Tape"
Patiently awaiting the launch of Gravity Probe B and the discovery of M39
Physics Commandment #2: Thou Shalt Conserve Mass/Energy In Closed Systems.

--

From: [EMAIL PROTECTED] (david avery)
Subject: Re: Moores Law (a bit off topic

Cryptography-Digest Digest #784

1999-06-26 Thread Digestifier

Cryptography-Digest Digest #784, Volume #9   Sun, 27 Jun 99 00:13:03 EDT

Contents:
  Re: A few questions on RSA encryption (S.T.L.)
  Re: trapdoor one way functions ([EMAIL PROTECTED])
  Re: DES-NULL attack (Jerry Coffin)
  Re: determining number of attempts required ([EMAIL PROTECTED])
  Re: A few questions on RSA encryption ([EMAIL PROTECTED])
  Re: determining number of attempts required ([EMAIL PROTECTED])
  Re: A few questions on RSA encryption (S.T.L.)
  Re: On an old topic of internet publication of strong crypto (JPeschel)
  Re: Moore's Trend (Horst Ossifrage)
  Re: A few questions on RSA encryption (Gilad Maayan)
  Re: VIC cipher now described on web site (Uri Blumenthal)



From: [EMAIL PROTECTED] (S.T.L.)
Subject: Re: A few questions on RSA encryption
Date: 27 Jun 1999 01:13:43 GMT

I'm replying to multiple posters, just to let you know.

<>

What kind of hardware limitations? That must be pretty limited - I can have a
calculator (TI-89) that fits in my pocket (or a TI-92 if I have slightly larger
pockets... :-D   ) perform RSA with a 300-decimal-digit key, approximately a
1024-bit keysize! Of course, it's not *that* speedy.

I said:
<>

Someone replied:
<>

By what I said, I was referring to how difficult it is for the Adversary to
determine the *munged* keyseed used in the symmetric encryption, based on the
ciphertext. The Adversary knows the non-munged keyseed, the symmetric
algorithm, and the ciphertext. Apparently (according to the original poster),
the Adversary does not have the plaintext. However, what the original poster IS
concerned about is the security of the munging process, not the plaintext
itself. That's a little odd, of course. When I referred to how well the
symmetric cipher "hides" (see the quotation marks?) the *munged* keyseed, I
meant exactly what I stated in the first sentence of the paragraph. The
Adversary must FIRST determine the *munged* keyseed (which he does not know)
from the symmetric encryption algorithm and the ciphertext, BEFORE comparing
the *munged* keyseed with the keyseed he already knows, IN ORDER to determine
the munging process, which is what the original poster is concerned about. Or
maybe I'm wrong - the last question was quite complex and not a very common
one.


<>

Why not? A little experiment:

We have two friends: Al and Bob. They each can do RSA. Al prepares a modulus,
and a secret key for himself and the corresponding public key. He gives the
modulus and the public key to Bob, *securely*, just like he would give Bob an
IDEA key securely. Bob does the same for Al. Now, Ezekiel enters the room, and
prevents any secure communication (but does not, of course, compromise the
security of their individual computers). Al and Bob can, however, send messages
encrypted with RSA, and Ezekiel has no idea what the modulus is.

Now, OBVIOUSLY, keeping the public key and modulus a secret prevents
transmission of RSA keypairs over non-secure lines, making RSA effectively just
like a symmetric cipher. But stronger, I say, because of it. :-D Of course,
this would be unsuitable for an application like PGP, which lets users fully
enjoy the advantages of asymmetric cryptography.

<>

I said extremely difficult, and then I said I could not *quantify* it. What is
your problem with that? 512 bits seems "extremely difficult" to me. I never
said "extremely difficult but feasible", which is what you interpreted it as.

<>

Um, duh. That's why no one really worries about chosen-plaintext attacks as
long as the message is not extraordinarily small. That's why RSA is considered
secure. You keep thinking I mean that these attacks are practical, which they
(in general use) most certainly are NOT.

<>

Of course. But keeping the modulus secret improves security somewhat, with the
associated disadvantages of more difficult use. Why reveal anything that you
don't *have* to, if your algorithm is good? (Attention: NOT an argument for
keeping algorithms secret, you see.)

-*---*---
S.T.L.  ===> [EMAIL PROTECTED] <===  BLOCK RELEASED!2^3021377 - 1 is PRIME!
Quotations:  http://quote.cjb.net  Main website:  http://137.tsx.orgMOO!
"Xihribz! Peymwsiz xihribz! Qssetv cse bqy qiftrz!"  e^(i*Pi)+1=0   F00FC7C8
E-mail block is gone. It will return if I'm bombed again. I don't care, it's
an easy fix. Address is correct as is. The courtesy of giving correct E-mail
addresses makes up for having to delete junk which gets through anyway. Join
the Great Internet Mersenne Prime Search at http://entropia.com/ips/  Now my
.sig is shorter and contains 3379 bits of entropy up to the next line's end:
-*---*---

Card-holding member of the Dark Legion of Cantorians, the Great SRian
Conspiracy, the Triple-Sigma Club, and the Union of Quantum Mechanics
Avid watcher of "World's Most Terrifying Causality Violations", "World's
Scariest Warp Accidents", and "When Tidal Forces Attack: Caught on Tape"
Patiently awaiti

Cryptography-Digest Digest #783

1999-06-26 Thread Digestifier

Cryptography-Digest Digest #783, Volume #9   Sat, 26 Jun 99 21:13:03 EDT

Contents:
  Re: RSA msg length... (Gilad Maayan)
  Re: A few questions on RSA encryption (Gilad Maayan)
  Re: A few questions on RSA encryption ([EMAIL PROTECTED])
  Re: Kryptos article (Jim Gillogly)
  Re: Moores Law (a bit off topic) ([EMAIL PROTECTED])
  trapdoor one way functions ([EMAIL PROTECTED])
  Re: Tough crypt question: how to break AT&T's monopoly??? ([EMAIL PROTECTED])
  Re: DES-NULL attack ([EMAIL PROTECTED])
  determining number of attempts required (Keith A Monahan)
  Re: DES-NULL attack (JPeschel)
  Re: A few questions on RSA encryption ([EMAIL PROTECTED])
  Re: determining number of attempts required ([EMAIL PROTECTED])
  Re: A few questions on RSA encryption ([EMAIL PROTECTED])
  Re: determining number of attempts required (Keith A Monahan)
  Re: RSA msg length... ([EMAIL PROTECTED])
  Re: DES-NULL attack ([EMAIL PROTECTED])



From: [EMAIL PROTECTED] (Gilad Maayan)
Subject: Re: RSA msg length...
Date: Sat, 26 Jun 1999 21:18:19 GMT

Okay, but what happens if the message is much smaller than the key?
Say I'm trying to encrypt 20 bits with a 512 or 1024-bit key. Would I
be able to?

--

From: [EMAIL PROTECTED] (Gilad Maayan)
Subject: Re: A few questions on RSA encryption
Date: Sat, 26 Jun 1999 21:49:27 GMT

>Okay, why involve RSA? If you are assuming that the Adversary has broken it,
>why not *simplify* your scenario and have the keyseed sent in the clear? (We
>can have absurd situations!)

Well, for reasons of hardware limitations, I'm thinking of using a
relatively small RSA key. So it will be a bit difficult for your
casual attacker to break it, but a more determined analyser might get
through it, and find this second layer.

>Therefore, the strength of your resulting encryption... how well the symmetric cipher 
>"hides" the munged keyseed.

Hold on, the symmetric cypher isn't hiding the keyseed - the keyseed
is out in the open (in plaintext form). If it wasn't, you wouldn't be
able to decrypt the message, and it would be pretty much useless. If
I'm not mistaken.

--

From: [EMAIL PROTECTED]
Subject: Re: A few questions on RSA encryption
Date: Sat, 26 Jun 1999 22:16:21 GMT

In article <[EMAIL PROTECTED]>,
  [EMAIL PROTECTED] (Gilad Maayan) wrote:
> 1. I haven't been able to find any information on the relationship
> between the number of bits encrypted by RSA, and the level of security
> obtained. Let's say you're encrypting 20 bits with a 512 or 1024 bit
> key. Is the small size of the plaintext relevant? Will the encrypted
> message be easier to crack than, say, an entire document encoded by
> the same RSA key?

Well I think PKCS #1 covers this and it should be <= half the modulus
size if I am correct.  I am not sure why you would have to read the
standard.  AC covers it as well.

Also the size of the private exponent/modulus will effect the safety of
the key.  A smaller exponent/modulus will be easier to factor and thus
find the private key.

> 2. Would it be at all possible to break an RSA cyphertext, knowing
> neither the secret key, the public key, or the modulus?

If you know the secret exponent and the modulus (the modulus is public)
then one could decrypt the ciphertext easily.

> 3. Would it be possible to extrapolate an RSA key from a cyphertext,
> if the plaintext was known? (assuming that neither the key used for
> encryption nor its corresponding modulus are known).

The plaintext is always known for the attacker.  That's because the
keys are public/private.  So I would assume the answer is no.

> 4. If the modulus and public key were known, would available
> cyphertext-plaintext make the cryptoanalysis process faster or easier?

The modulus is always known.  The factors are not however.

I don't think you understand the algorithm to well.  I don't know the
theory but I do know how it works.

You have p and q which are prime.  The modulus n = pq is public but p
and q are not.  e is the private exponent C = P^e mod pq, and the d is
the public exponent P = C^d mod pq.

Basically (pq, d) = public, (p, q, e) = private.  You don't need to
keep p and q after the keys are generated however.

The most common method of attack is to factor pq into p and q.  If you
can do this you can somehow find e from g^d mod pq.

Remember that public key crypto is different then secret key crypto.
The attack will have unlimited access to chosen plaintexts because they
will have the encrypting key.  Therefore the security is solely on the
difficulty of finding the decrypting key.  In RSA this is as difficult
as factoring large composites (well that's a conjecture but...).  Just
like in Diffie-Hellman the security comes from finding the discrete
logarithms.

There are attacks where the modulus is too small, and attacks where e
or d are to small.  I would read a good description of RSA before

Cryptography-Digest Digest #782

1999-06-26 Thread Digestifier

Cryptography-Digest Digest #782, Volume #9   Sat, 26 Jun 99 18:13:04 EDT

Contents:
  A few questions on RSA encryption (Gilad Maayan)
  Re: generated pad for OTP? (Bill Unruh)
  Re: A few questions on RSA encryption (S.T.L.)
  Re: Tough crypt question: how to break AT&T's monopoly??? (Bill Unruh)
  Re: generated pad for OTP? (Bill Unruh)
  Re: Moores Law (a bit off topic) (S.T.L.)
  Re: one time pad (S.T.L.)
  Re: Tough crypt question:  how to break AT&T's monopoly??? (S.T.L.)
  Re: Moores Law (a bit off topic) (Horst Ossifrage)
  Re: A few questions on RSA encryption (Bill Unruh)
  A few questions on RSA encryption (Gilad Maayan)
  Re: DES-NULL attack ("Mike Murray")



From: [EMAIL PROTECTED] (Gilad Maayan)
Subject: A few questions on RSA encryption
Date: Sat, 26 Jun 1999 20:59:20 GMT

I have a couple of questions on RSA, I hope someone will be able to
help.

1. I haven't been able to find any information on the relationship
between the number of bits encrypted by RSA, and the level of security
obtained. Let's say you're encrypting 20 bits with a 512 or 1024 bit
key. Is the small size of the plaintext relevant? Will the encrypted
message be easier to crack than, say, an entire document encoded by
the same RSA key?

2. Would it be at all possible to break an RSA cyphertext, knowing
neither the secret key, the public key, or the modulus?

3. Would it be possible to extrapolate an RSA key from a cyphertext,
if the plaintext was known? (assuming that neither the key used for
encryption nor its corresponding modulus are known).

4. If the modulus and public key were known, would available
cyphertext-plaintext make the cryptoanalysis process faster or easier?

5. (This one concerns DES, despite the topic :) Let's take a specific
encryption scenario, where a random key-seed is run through two
different functions. The two keys generated by this process, each 64
bits long, are used for a Triple-DES operation, the result of which is
sent through a non-secure medium. The key-seed is be encrypted using
RSA, and sent along with the enrypted message. If the two functions
aren't known to an attacker, and he manages to break the RSA code and
obtain the key-seed, would he be able to use that to extrapolate the
said functions from the encrypted message? I'm aware of the
key-management issues that arise from this scenario; my question
relates to a purely mathematical attack.

Many thanks,
Gilad Maayan

--

From: [EMAIL PROTECTED] (Bill Unruh)
Subject: Re: generated pad for OTP?
Date: 26 Jun 1999 21:28:20 GMT

In <[EMAIL PROTECTED]> Benjamin Goldberg 
<[EMAIL PROTECTED]> writes:

>The "SecureRandom" generator produces 20 psuedo-random bytes at a time, by
>incrementing a 64-bit counter, and using a SHA-1 digest on that counter
>and a seed.  While I know you can't reconstruct a message directly from a

This could be very easy to figure out if the seed is knowable or
guessable. The seed is essentially the key to this cypher, and with too
small a seed, this system will easily fall to exhaustive search. I would
also worry that the SHA of two strings which differ in so few bits might
be susceptible to breaking. SHA(seed+SHA(counter)) might be better-- but
slow.
Note, as will all such stream cyphers, you can never reuse your
key(seed).

--

From: [EMAIL PROTECTED] (S.T.L.)
Subject: Re: A few questions on RSA encryption
Date: 26 Jun 1999 21:31:10 GMT

<>

Okay, I'll try.

<<1. I haven't been able to find any information on the relationship
between the number of bits encrypted by RSA, and the level of security
obtained. Let's say you're encrypting 20 bits with a 512 or 1024 bit
key. Is the small size of the plaintext relevant? Will the encrypted
message be easier to crack than, say, an entire document encoded by
the same RSA key?>>

Small plaintexts ARE a problem, as you anticipated. RSA is vulnerable to
chosen-plaintext attacks (I think that's what they are called), because ANYONE,
including the Adversary (the hypothesized cracker) can encrypt plaintexts of
their choice and notice if they match the ciphertext. For a 20-bit plaintext,
then the Adversary needs only try to encrypt 2^20 plaintexts before he finds
one that produces the same ciphertext. A larger document is therefore more
protected, and any document over, say, 256 bits is pretty darn safe.

<<2. Would it be at all possible to break an RSA cyphertext, knowing
neither the secret key, the public key, or the modulus?>>

I am not sure. Probably not. There are a heck of a lot possible keypairs, and
not knowing even the modulus makes it worse for the Adversary. Keeping even the
public key-and-modulus secret has to improve security, but I'm not sure by how
much.

<<3. Would it be possible to extrapolate an RSA key from a cyphertext,
if the plaintext was known? (assuming that neither the key used for
encryption nor its corresponding modulus are

Cryptography-Digest Digest #781

1999-06-26 Thread Digestifier

Cryptography-Digest Digest #781, Volume #9   Sat, 26 Jun 99 16:13:06 EDT

Contents:
  Jim Gillogly on The Today Show: Kryptos (John L. Allen)
  Re: Kryptos article (B & J)
  Re: Kryptos article (wtshaw)
  Re: DES-NULL attack (Thomas Pornin)
  Re: DES-NULL attack (Thomas Pornin)
  Re: DES-NULL attack ([EMAIL PROTECTED])
  Re: DES-NULL attack (Thomas Pornin)
  Re: Tough crypt question:  how to break AT&T's monopoly??? (Dave Hazelwood)
  Re: DES-NULL attack (fungus)
  Re: DES-NULL attack (fungus)
  Re: Scramdisk cracked (A C Wilshere)
  Re: DES-NULL attack ([EMAIL PROTECTED])
  Re: DES-NULL attack (Horst Ossifrage)
  Re: one time pad (Greg Ofiesh)
  Re: one time pad (Greg Ofiesh)
  Moores Law (a bit off topic) ([EMAIL PROTECTED])
  Re: DES-NULL attack (William Tanksley)
  Re: one time pad (Greg Ofiesh)
  Re: one time pad (Greg Ofiesh)
  Re: one time pad (John Savard)
  Re: one time pad (Greg Ofiesh)
  Re: Tough crypt question:  how to break AT&T's monopoly??? (Jayjames99)



From: [EMAIL PROTECTED] (John L. Allen)
Subject: Jim Gillogly on The Today Show: Kryptos
Date: 25 Jun 1999 15:39:13 -0400

Jim Gillogly was on the NBC Today show this morning.
There was a segment on the "Kryptos" sculpture outside
the NSA, and he was billed as the guy who cracked part
of the code using a computer.

There was even a very brief "demo" of how decrypting
is done.  

(There's no hiding now, Jim :-)

John.
-- 
_/JohnL\[EMAIL PROTECTED] : 9.5 billion pounds per sec to energy
~\Allen/~Fax: 516-575-7428: 1e22 stars = 22 solar masses per sec

--

From: B & J <[EMAIL PROTECTED]>
Subject: Re: Kryptos article
Date: Sat, 26 Jun 1999 06:17:14 +


I got quite interested in this KRYPTOS code thing, and was able to find the
keys for the first
2 parts, but does anyone know if the keys mean anything at all , perhaps
encrypted ? seems like gibberish to me

- Ben



--

From: [EMAIL PROTECTED] (wtshaw)
Subject: Re: Kryptos article
Date: Sat, 26 Jun 1999 00:50:25 -0600

In article <[EMAIL PROTECTED]>, "Douglas A. Gwyn"
<[EMAIL PROTECTED]> wrote:

> Jim Gillogly wrote:
> > Reflecting on this, I realized it's utter garbage.  The pool would
> > swap up and down, not right and left.  Never mind.
> 
> Um, Jim, mirrors don't reverse in any particular direction.
> Martin Gardner had a discussion of this in one of his books:
> Why is your image in a flat mirror reversed left-to-right,
> not top-to-bottom?  (Think about it; it can produce one of
> those moments of "enlightenment".)

Congratulations Jim...now, time for recovery. If you come to Atlanta for
the convention, please bring your costume; pardon me if I leave my best
suit, my coveralls, at home.

Something a mirror cannot fully reverse:

.emoh ta ,sllarevoc ym ,tius tseb ym evael I fi em nodrap ;emutsoc ruoy
gnirb esaelp ,noitnevnoc eht rof atnaltA ot emoc uoy fI .yrevocer rof emit
,won...miJ snoitalutargnoC
-- 
It's always possible that a politician is acting out of principles.
--Michael Kinsley of Slate.com

--

From: [EMAIL PROTECTED] (Thomas Pornin)
Subject: Re: DES-NULL attack
Date: 26 Jun 1999 07:36:47 GMT

According to  <[EMAIL PROTECTED]>:
> Let a plain text block contains only bits with NULL value.
> 
> Then correspondent cipher block is well-defined function
> of the encryption key, which can be recovered.

Ok. Prove it. Here is the result of the DES encryption of 0 by a secret
key of mine:

e5d72a33650d160f

Now show me the key.

--Thomas Pornin

--

From: [EMAIL PROTECTED] (Thomas Pornin)
Subject: Re: DES-NULL attack
Date: 26 Jun 1999 07:40:10 GMT

According to JPeschel <[EMAIL PROTECTED]>:
> Consider an intelligence agency with plenty of money to spend on
> ASICs.*

As usual: if some agency has so much power and is after me, the
possibility that they could recover a DES key in a few days with a
hardware worth dozens millions of dollars is the least of my concerns.
They could kidnap me for much less.

Anyway, the limit if generally considered to be about 80 bits.

--Thomas Pornin

--

From: [EMAIL PROTECTED]
Subject: Re: DES-NULL attack
Date: Sat, 26 Jun 1999 12:38:16 GMT

In article <7l204q$mci$[EMAIL PROTECTED]>,
  [EMAIL PROTECTED] (Thomas Pornin) wrote:
> As usual: if some agency has so much power and is after me, the
> possibility that they could recover a DES key in a few days with a
> hardware worth dozens millions of dollars is the least of my concerns.
> They could kidnap me for much less.
>
> Anyway, the limit if generally considered to be about 80 bits.

By whom?  If a 64-bit key is not safe an 80-bit key is probably not
safe.  If we are to follow the skeptism.

You know it's funny.  I work on crypto stuff almost all the time, but I
hardly ever use it myself...  When I do it's for PGP messages and
such.

64-bit keys will keep my