Cryptography-Digest Digest #670

1999-12-02 Thread Digestifier

Cryptography-Digest Digest #670, Volume #10   Fri, 3 Dec 99 00:13:01 EST

Contents:
  Re: Any negative comments about Peekboo free win95/98 message encryptor (Tom McCune)
  Re: Encrypting short blocks ("Dan Schwartz")
  Re: What part of 'You need the key to know' don't you people get? (Johnny Bravo)
  Re: Quantum Computers and PGP et al. (Johnny Bravo)
  Re: NSA should do a cryptoanalysis of AES (Johnny Bravo)
  Re: The $10,000.00 contesta (Johnny Bravo)
  Re: Any negative comments about Peekboo >> how to confirm designer  
([EMAIL PROTECTED])
  Re: Any negative comments about Peekboo >> How to verify that promised  
([EMAIL PROTECTED])
  Re: NSA should do a cryptoanalysis of AES (SCOTT19U.ZIP_GUY)
  repeated DH over MOD P (jerome)
  Re: NP-hard Problems (Bill Unruh)
  Re: Elliptic Curve Public-Key Cryptography (Paul Rubin)
  Re: Why Aren't Virtual Dice Adequate? ("r.e.s.")



Crossposted-To: alt.security.pgp
From: Tom McCune <[EMAIL PROTECTED]>
Subject: Re: Any negative comments about Peekboo free win95/98 message encryptor
Date: Fri, 03 Dec 1999 01:09:42 GMT

In article <8274av$hn0$[EMAIL PROTECTED]>, [EMAIL PROTECTED] (Keith A 
Monahan) wrote:

>I trust it's security enough to send a message across irc, but I wouldn't
>choose to use it to say, encrypt my credit card to another person.

This thread has gained enough of my interest to download it, and  I'm 
generating a key right now - actually it didn't take very long and I have 
already  made another one so I can use the program with myself.  I am a little 
puzzled with the above level of trust - since I often hand my credit card over 
to all kinds of strangers (for purchases), I personally consider credit card 
info encryption to require very little confidence.  

-Tom

I use PGP for Privacy and Authenticity:
http://www.Tom.McCune.net/PGP.htm

--

From: "Dan Schwartz" <[EMAIL PROTECTED]>
Subject: Re: Encrypting short blocks
Date: Thu, 2 Dec 1999 20:36:03 -0500

Markus Peuhkuri wrote in message ...
> What I want is following property: given message M1 (length N
> bits) produces same encrypted message E1 (length N bits) every
> time run.  Message M2 produces message E2, which is different
> from E1 iff message M2 is different from M1.  However, I'm
> willing to accept some probability of collisions, less than
> 1/1000 (different messages M1 and M2 produce same result E1).

It sounds like you don't need to decrypt the messages, i.e. derive M1 from
E1.  If that's the case, just pad each message to a standard block length
(e.g. 64 bits), use any encryption algorithm, and take N bits of the result.
Any good encryption algorithm should produce results that "look" random,
making the likelihood of a collision between any two messages roughly 1 in
2^N.

If you want a very simple algorithm, and don't require super strong
security, check out TEA.

Dan Schwartz



--

From: [EMAIL PROTECTED] (Johnny Bravo)
Subject: Re: What part of 'You need the key to know' don't you people get?
Date: Thu, 02 Dec 1999 20:43:21 GMT

On Thu, 02 Dec 1999 11:36:08 -0600, [EMAIL PROTECTED] (wtshaw) wrote:

>There are so many cases of everybody being wrong when someone else is
>right.  You honestly cannot reject a single detractor on sight.  I assure
>you that I want to see evidence of his claims if possible, or define them
>at least worth more study. 

  If they have a claim and offer evidence to support this claim, then
we can define the claim as worth more study.
  Making a claim and offering no proof other than the assertion "I'm
right, and you are wrong." is not worth further study.  This is
because even if you prove that one claim wrong, they will just throw
out more claims.  It is easier to make claims that to support or
disprove them, why should the community be tasked with debunking every
crackpot theory that anyone could ever come up with.  If you want
people to consider your claims, you need evidence that your claim is
valid.

>The last thing I am going to do is reject
>claims if there is reason to believe that they might be true. 

  Really?  I claim you are a murderer.  Given that the other people on
this group don't personally know either of us (and have no idea if I
know you personally or not), there is a reason to believe that it
might be true.  So now you should prove to the group that you are NOT
a murderer.  

>Being open
>to such things may seem a burden, but it is a requirement nonetheless.

  There is no requirement that we should accept spurious claims
without evidence.  Logic suggests otherwise.

>Personaly, I have a few rather unpopular ideas myself, backed up by my
>experience; if they prove accurate according to additional data, mine or
>others, I surely will mention them again. 

  This is where you diverge from the topic of discussion.  You are
willing to test your ideas according to existing data.  Only when you
are sure t

Cryptography-Digest Digest #669

1999-12-02 Thread Digestifier

Cryptography-Digest Digest #669, Volume #10   Thu, 2 Dec 99 20:13:02 EST

Contents:
  Re: Quantum Computers and Weather Forecasting ("Trevor Jackson, III")
  Re: more about the random number generator (CLSV)
  "Fingerprinting" an algorithm? (John Savard)
  Re: Any negative comments about Peekboo free win95/98 message encryptor   program ? 
(Steve K)
  Re: Why Aren't Virtual Dice Adequate? ("Trevor Jackson, III")
  Re: Random Noise Encryption Buffs (Look Here) ("r.e.s.")
  Re: Any negative comments about Peekboo free win95/98 message encryptor (Keith A 
Monahan)



Date: Thu, 02 Dec 1999 19:26:48 -0500
From: "Trevor Jackson, III" <[EMAIL PROTECTED]>
Crossposted-To: sci.physics,sci.geo.meteorology
Subject: Re: Quantum Computers and Weather Forecasting

John Savard wrote:

> Quantum computers potentially offer the possibility of performing a
> computation in parallel for an enormous number of different
> combinations of input parameters, and then producing a result for only
> one such combination if that combination produces a result that meets
> certain criteria.
>
> This may be useful to extend the range and accuracy of weather
> forecasting.
>
> Although chaos theory sets an irreducible limit to the useful range of
> advance forecasts of weather, based on the growth of random inputs
> caused by nonlinearities in the system,
>
> in practice, the limit imposed by the limitations in the precision and
> detail of input data about the state of the weather at a given moment
> impose a stricter limit.
>
> It is theoretically possible to obtain information about the missing
> components of the state of the Earth's atmosphere at a given time by
> the following technique: for each possible set of values for the state
> of the unobserved part of the Earth's atmosphere, run the equations
> backwards to obtain a long-term "prediction" of the weather on
> preceding days. That hypothetical state of the atmosphere which
> produces the longest-term accurate forecast in the reverse direction
> is the state most likely to be correct.
>
> Quantum computers would seem to directly lend themselves to such a
> computation, should they become practical. (However, the limit on
> search algorithms may be fatal, as even the square root of the number
> of possibilities here is prohibitively large.)
>
> Perhaps there is a mathematical technique possible that avoids such
> extravagance, by working with the state of the weather several days
> ago, and incrementally updating missing parts of the atmospheric state
> in response to forecast errors. The principle would be the same: to
> use the depth of available atmospheric data in time to substitute for
> the lack of detail in our knowledge of the state of the atmosphere at
> any one moment.

A critical threshold exists in all such modeling systems.  One must insure
that the error bounds on the modeled state values grow more slowly that
the information gained at each step.  In essence, the backward prediction
has to converge.

One may run such a simulation backwards by increments, and thus detect
improbable initial states early in the search.  The ability to prune the
state/search space reduces the size of the problem but does not improve
the "convergence" rate.


--

From: CLSV <[EMAIL PROTECTED]>
Subject: Re: more about the random number generator
Date: Fri, 03 Dec 1999 00:24:42 +

Anton Stiglic wrote:
 
> Brian Chase wrote:

> > Naive question here.  Let's say you had access to some "optimum
> > compressor"  which would take arbitrary data sets distill them into their
> > most compact form.  By definition, the resulting data must have no
> > predictable redundancies, yes?

Correct.

> > Could you use optimally compressed data
> > sets as sources for random numbers?

That would be nice, however optimal compression can not be computed
in reasonable time.
 
> Your input would have to be random, so might as well just use the input
> (you'd have more bits of randomness).
> If you don't use random input, and I know about the compression algo
> you use, I could just reverse the output (decompress) and look at the
> results.  If they don't look random, I know you are not using random inputs,
> and might be able to predict futur outputs.

In Kolmogorov complexity an incompressible string is 
as random as you can get. The intuition is that a string that is
optimally compressed has no redundancy or patterns that you can
use to compress it. Because it has not (useful) patterns it is
also random. If you could decompress a string into a larger
random string. That larger string obviously has some patterns
so it isn't random.

Regards,

Coen Visser

--

From: [EMAIL PROTECTED] (John Savard)
Subject: "Fingerprinting" an algorithm?
Date: Fri, 03 Dec 1999 00:41:59 GMT

On 19 Nov 1999 09:21:36 -0700, crippa <[EMAIL PROTECTED]>
wrote in sci.crypt.research:

>Is

Cryptography-Digest Digest #668

1999-12-02 Thread Digestifier

Cryptography-Digest Digest #668, Volume #10   Thu, 2 Dec 99 19:13:01 EST

Contents:
  Safeboot is it really safe (Matt)
  Re: Quantum Computers and Weather Forecasting (John Savard)
  Re: NSA should do a cryptoanalysis of AES ("Brian Gladman")
  Re: Why Aren't Virtual Dice Adequate? ("r.e.s.")
  Re: newbie question (Kyle Hayes)
  Re: Why Aren't Virtual Dice Adequate? (John Myre)
  Re: Use of two separate 40 bit encryption schemes (fungus)
  Re: Why Aren't Virtual Dice Adequate? (Mickey McInnis)
  Re: Random Noise Encryption Buffs (Look Here) ("Trevor Jackson, III")



From: Matt <[EMAIL PROTECTED]>
Subject: Safeboot is it really safe
Date: Thu, 02 Dec 1999 23:13:50 +

Hi,

Which is the better for encription of HDD or partitions
safeboot or PGP for WinNT/Win95/Win98/Win2000
and Linux ?

Regards

Matt


--

From: [EMAIL PROTECTED] (John Savard)
Crossposted-To: sci.physics,sci.geo.meteorology
Subject: Re: Quantum Computers and Weather Forecasting
Date: Thu, 02 Dec 1999 23:13:36 GMT

Joseph Bartlo <[EMAIL PROTECTED]> wrote, in part:

>My initial comment is that although an interesting concept, I think the
>entire system must be considered, as do any intelligent modifications
>on it.  What does your concept say about a person dropping dry ice in
>a cloud & causing rain ?  Or dare I say with the risk of extreme criticism
>of people in the group who evidently feel this is completely impossible,
>that possibly from another being with far greater capabilities ?

>If you are talking about a *perfect* forecast, even if a butterfly flapping
>its wings disturbed the weather 2 weeks later a *known way*, you'd still
>have to know when & where it'd flap its wings :)

No; my post specifically states that while the *butterfly effect* sets
an _irreducible_ limit to forecasting, at present the number of sites
measuring the wind/air pressure/temperature leaves holes big enough
for things to slip through that _don't_ exist to create random
perturbations in the weather.

>Perhaps I'll have more comments after reading & correcting your site.
>Well, I am probably kidding about the latter ;)

My site doesn't really address the topic of this post, however I
flatter myself to think that it _is_ an interesting site none the
less.

John Savard (jsavardecnabca)
http://www.ecn.ab.ca/~jsavard/crypto.htm

--

From: "Brian Gladman" <[EMAIL PROTECTED]>
Subject: Re: NSA should do a cryptoanalysis of AES
Date: Thu, 2 Dec 1999 23:18:40 -


Trevor Jackson, III <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
> > Anyone who thinks that NSA will get at information in future by
> > breaking such algorithms (rather than their implementations) has not
> > understood the closing of the cryptographic knowledge gap between the
open
> > and closed worlds.
>
> How did you reach the conclusion that "the crypto gap" (shades of the
1950's
> "missile gap") has closed?  Why do you believe your supposed gap closing
should
> be obvious?

Becaue it a lesson about technology generally and not about cryptography in
particular.  And it stretches back into pre-history.  I don't want to bore
people with the details but my expereience has been that technolgies that
start in the closed government world most often migrate into civil
applications where over time more resources are deployed with the result
that the positions of the two worlds reverse.

In my career I have seen the move from defence to civil dominance in a
number of areas - in computer systems, in integrated circuits, in software
operating systems, in high level languages, in computer networking, in
display technologies, and now, in my view, in computer and cryptographic
security.

What happens is that government resources tend to be constrained but can be
spent on things that are not profitable since government does not need to
make money.  Government funded developments hence make the early running in
new technology areas. But as civil intersts become clearer and profits
become a driver civil resources get deployed and these are not bounded by
the limits on government expenditure and hence eventually grow to be much
greater in scale. Moreover, since government R&D resources are needed to
make the next breakthrough, once civil investment develops in a technology
area the incentive to put government money into it goes away.

And I see no reason to believe that this pattern will be any different for
cryptographic and security technologies now that the civil world has woken
up to the need for these.

 Brian Gladman




--

From: "r.e.s." <[EMAIL PROTECTED]>
Crossposted-To: sci.math
Subject: Re: Why Aren't Virtual Dice Adequate?
Date: Thu, 2 Dec 1999 15:20:17 -0800

"John Savard" <[EMAIL PROTECTED]> wrote ...
: [EMAIL PROTECTED] (Guy Macon) wrote, in part:
: > [EMAIL PROTECTED] (Tim Tyler) wrote:
: > > http://www.io.com/~r

Cryptography-Digest Digest #667

1999-12-02 Thread Digestifier

Cryptography-Digest Digest #667, Volume #10   Thu, 2 Dec 99 18:13:01 EST

Contents:
  Re: smartcard idea? ("anonymous intentions")
  Re: NSA should do a cryptoanalysis of AES ("Trevor Jackson, III")
  Re: Encrypting short blocks (Anton Stiglic)
  Re: Use of two separate 40 bit encryption schemes (Eric Lee Green)
  Re: Encrypting short blocks (Anton Stiglic)
  Re: What part of 'You need the key to know' don't you people get? ("Trevor Jackson, 
III")
  Re: Encrypting short blocks ("Douglas A. Gwyn")
  Re: What part of 'You need the key to know' don't you people get? ("Trevor Jackson, 
III")
  Re: Decyption proof cellphones in Europe? [x3] ("Trevor Jackson, III")
  Re: more about the random number generator (Anton Stiglic)
  Re: more about the random number generator (Anton Stiglic)
  Re: What part of 'You need the key to know' don't you people get? ("Douglas A. Gwyn")
  Re: Why Aren't Virtual Dice Adequate? ("Douglas A. Gwyn")
  Re: NP-hard Problems (James Pate Williams, Jr.)
  Re: NP-hard Problems (Anton Stiglic)



From: "anonymous intentions" <[EMAIL PROTECTED]>
Subject: Re: smartcard idea?
Date: Thu, 2 Dec 1999 14:28:15 -0600

Unless of course you create a rechargeable device in the HID proximity
card, but then you have the issue of spoofing via RF. Contactless isn't such
a great idea even if it is only transmitting a session hash. Contacts would
be better if they contained a pin on-board the card itself or on an
interpreter module on the card in which the PIN would never leave the card
or IM itself. Even better than that is a biometric thumbstamp that would
activate PIN access on the card interpreter.

kill4u at hushmail dot com


Shawn Willden <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
> [EMAIL PROTECTED] wrote:
>
> >  Your LED docking could be a LOT cleaner and more trouble free than
> > magnetic stripes or electrical contact pin connections.
>
> I wasn't suggesting the LED would be used for communication
> with the ATM,
> just with the user.  Using it instead of electrical contacts
> would mean the
> card would have to contain its own power source (e.g. a
> battery) which isn't
> currently feasible, AFAIK.
>
> Shawn.



--

Date: Thu, 02 Dec 1999 17:32:58 -0500
From: "Trevor Jackson, III" <[EMAIL PROTECTED]>
Subject: Re: NSA should do a cryptoanalysis of AES

> Anyone who thinks that NSA will get at information in future by
> breaking such algorithms (rather than their implementations) has not
> understood the closing of the cryptographic knowledge gap between the open
> and closed worlds.

How did you reach the conclusion that "the crypto gap" (shades of the 1950's
"missile gap") has closed?  Why do you believe your supposed gap closing should
be obvious?


--

From: Anton Stiglic <[EMAIL PROTECTED]>
Subject: Re: Encrypting short blocks
Date: Thu, 02 Dec 1999 17:33:48 -0500

"Douglas A. Gwyn" wrote:

> Markus Peuhkuri wrote:
> > Is there an encyprion algorithm that can be used for short
> > blocks (variable from ~10 to 24 bits) _and_ the result is same
> > length as original data.
>
> Yes, most binary-oriented stream ciphers have that property.

A stream cipher is not a block cipher.



--

From: Eric Lee Green <[EMAIL PROTECTED]>
Subject: Re: Use of two separate 40 bit encryption schemes
Date: Thu, 02 Dec 1999 15:30:57 -0700

Shawn Willden wrote:
> double encryption to 41 bits.  However, if you
> triple-encrypt your packets
> with 40-bit DES before transmitting them, you can get 80-bit
> strength (you
> can use either two or three 40-bit keys, but if you use two
> keys, make
> sure to alternate their usage).  

One thing to note for us Amurricans is that the BXA would consider this to be
an 80-bit cipher, rather than multiple applications of a 40 bit cipher, and
would regulate it as such. Obviously I cannot say what a foreign government
would believe, but given the amount of incest at top levels, I suspect their
policies would be similar.

-- 
Eric Lee Green [EMAIL PROTECTED]
Software Engineer  Visit our Web page:
Enhanced Software Technologies, Inc.   http://www.estinc.com/
(602) 470-1115 voice   (602) 470-1116 fax

--

From: Anton Stiglic <[EMAIL PROTECTED]>
Subject: Re: Encrypting short blocks
Date: Thu, 02 Dec 1999 17:35:19 -0500

wtshaw wrote:

> In article <[EMAIL PROTECTED]>, Markus Peuhkuri
> <[EMAIL PROTECTED]> wrote:
>
> > Is there an encyprion algorithm that can be used for short
> > blocks (variable from ~10 to 24 bits) _and_ the result is same
> > length as original data. The key may be much larger (128, 256,
> > ...).
> >
> 
> >
> > Could some existing algorithm be changed to work like that?
> >
> Sure thing, block length and key length have little relationship aside
> 

Cryptography-Digest Digest #666

1999-12-02 Thread Digestifier

Cryptography-Digest Digest #666, Volume #10   Thu, 2 Dec 99 17:13:01 EST

Contents:
  Re: Why Aren't Virtual Dice Adequate? (John Savard)
  Re: newbie question (John Savard)
  Re: Random Noise Encryption Buffs (Look Here) (Mattias Wecksten)
  Re: Quantum Computers and Weather Forecasting (Uncle Al)
  Re: Noise Encryption (Mattias Wecksten)
  Re: Elliptic Curve Public-Key Cryptography ("Michael Scott")
  Re: NSA should do a cryptoanalysis of AES ("Brian Gladman")
  Re: The Code Book - Part 4 ("Scott Williamson")
  Re: dictionary (drickel)
  Re: Quantum Computers and Weather Forecasting (Joseph Bartlo)
  crypto faculty position (Christof Paar)
  Re: smartcard idea? (Shawn Willden)
  Re: High Speed (1GBit/s) 3DES Processor (Shawn Willden)
  Re: smartcard idea? (Shawn Willden)
  Re: Use of two separate 40 bit encryption schemes (Shawn Willden)
  Re: Quantum Computers and Weather Forecasting (John Bailey)
  Is there an analog of Shor's algorithm for elliptic functions? (John Bailey)
  Microsoft Crypto API ([EMAIL PROTECTED])
  Re: crypto faculty position >> What is the $ range for the positions  
([EMAIL PROTECTED])
  Re: Quantum Computers and PGP et al. (Greg)



From: [EMAIL PROTECTED] (John Savard)
Crossposted-To: sci.math
Subject: Re: Why Aren't Virtual Dice Adequate?
Date: Thu, 02 Dec 1999 19:29:33 GMT

[EMAIL PROTECTED] (Guy Macon) wrote, in part:


>Good info!  I have a clueless newbie question about something that
>I found while reading the above:

>| "Nor does even a theoretical one time pad imply unconditional security:
>| Consider A sending the same message to B and C, using, of course, two
>| different pads. Now, suppose the Opponents can acquire plaintext from
>| B and intercept the ciphertext to C. If the system is using the usual
>| additive combiner, the Opponents can reconstruct the pad between A
>| and C. Now they can send C any message they want, and encipher it
>| under the correct pad. And C will never question such a message,
>| since everyone knows that a one time pad provides "absolute" security
>| as long as the pad is kept secure. Note that both A and C have done
>| this, and they are the only ones who had that pad." 

>It seems that the attacker needs to also have to know that A sent
>the same message to B and C.  Knowing B's plaintext and knowing
>that B and C got the same message resolves to knowing C's plaintext.
>I see no way that a man in the middle attacker can know whether or
>not A sent the same message to B and C.

The attacker can't know that for sure. But such an active attack is
still possible: it is at least _possible_ that, if two messages of the
same length are involved, this has happened. If this is done, either
the false message is inserted, or C will simply recieve undecodable
nonsense. (The idea is that the _chance_ of both messages being the
same is MUCH greater than the chance of a particular message guessed
at random.)

The idea is that B and C belong to the same side, but B is secretly
one of your spies. It can be refined by leaving header fields in C's
message alone. (Imagine B, C, D, E, F, G, H... and B and D are both
your spies, and they have on previous occasions both recieved
identical messages, but on their own OTPs.)

While not disproving the security properties the OTP does have, it
shows that there is still a possibility of attack that can very easily
be overlooked - and has been overlooked, as I haven't seen this
mentioned anywhere else - *an OTP does not provide perfect
authentication of any message sent to more than one recipient*.

John Savard (jsavardecnabca)
http://www.ecn.ab.ca/~jsavard/crypto.htm

--

From: [EMAIL PROTECTED] (John Savard)
Subject: Re: newbie question
Date: Thu, 02 Dec 1999 19:32:43 GMT

Kyle Hayes <[EMAIL PROTECTED]> wrote, in part:

>but I can't figure out how to use the Crypto API to
>get the actual binary string of the key (it is a session key).

It is *intended* that you cannot access that, since the Crypto API is
intended to _prevent_ interoperable use of any cryptographic software
that isn't signed by Microsoft.

This ensures that non-US customers cannot make use of encryption
software with a key size over 40 bits in connection with exportable
software that allows, through the Crypto API, the use of encryption
_within the terms of the U.S. export laws_.

John Savard (jsavardecnabca)
http://www.ecn.ab.ca/~jsavard/crypto.htm

--

From: Mattias Wecksten <[EMAIL PROTECTED]>
Subject: Re: Random Noise Encryption Buffs (Look Here)
Date: Thu, 02 Dec 1999 20:43:14 +0100

I hope I enter this thread at the right point.

I started to get curious about why this conversaion spun off at all?
When using a OTP the key-randomness is not critical.
Transfering the key is.

MvH M WxX

* Suddenly I realized that it was possible to create a secure system for use on any
  free web server at all, only using JAVAS

Cryptography-Digest Digest #665

1999-12-02 Thread Digestifier

Cryptography-Digest Digest #665, Volume #10   Thu, 2 Dec 99 14:13:02 EST

Contents:
  Any negative comments about Peekboo free win95/98 message encryptor  
([EMAIL PROTECTED])
  Re: What part of 'You need the key to know' don't you people get? (wtshaw)
  Re: NSA should do a cryptoanalysis of AES (wtshaw)
  Re: AES cyphers leak information like sieves (wtshaw)
  Re: Why Aren't Virtual Dice Adequate? (Guy Macon)
  Re: Encrypting short blocks (wtshaw)
  Re: Use of two separate 40 bit >> tony >> Where you posting from ? [  
([EMAIL PROTECTED])
  Re: Elliptic Curve Public-Key Cryptography (Medical Electronics Lab)
  Please  Check  my  understanding  of  Montgomery  Algorithm (Vasudev Pai)
  Re: Quantum Computers and PGP et al. (Jim Dunnett)
  Re: Ultimate Crypto Protection? (Jim Dunnett)
  Re: Decyption proof cellphones in Europe? [x3] (Jim Dunnett)
  Quantum Computers and Weather Forecasting (John Savard)
  Re: Decyption proof cellphones in Europe? [x3] (Eric Pinnell)



From: [EMAIL PROTECTED]
Crossposted-To: alt.security.pgp
Subject: Any negative comments about Peekboo free win95/98 message encryptor 
Date: Thu, 02 Dec 1999 12:09:41 -0500

Any / negative comments / evaluations / possible back-door entry / stableness /
known software & hardware conflicts / 
about Peekboo free win95/98 message encryptor program ?

It is listed on site http://www.counterpane.com/products.html because it is
using Blowfish [ some sort of endorsement from Blowfish creator ].
The main site is at http://www.cell2000.net/security/peekboo/index.html
The program is provided in 1 [ ONE ] executable only >> extremely secure in
extremely insecure win95 environment.
Executable is extremely small >> less than 50 kB.
Peekboo is freeware & current Source Code publicly available.

The program is modestly new [ the first Public Key on site is dated Sep 28 /
1999 ]

Peekboo is a free win95/98 message encryptor program. It has many features which
will be discussed on the other pages. It basically allows for secure
communication with any person (even people you have not physically met yet)
using any text medium (such as email or chat programs).

Current Release is v1.73 (Nov 23rd 1999)

The main problem it tries to solve is insecure transportation of text messages
over any text medium (such as email, chat and usenet). To obtain this goal I had
to add symmetric ciphers to actually encrypt the message, a hash function (which
is used in many places) and diffie-hellman key exchange. Nothing else was added
(such as swap file cleaning, file wiping) because they would not solve my
problem.

The author is claiming these features :

Diffie-Hellman Key Exchange 
Secure method for people to share a private key remotely. 
Simple to use. 
Uses a 2048 bit strong prime as the modulus 
*** Group Shared keys planned for V2.0 *** 

Seven Symmetric Ciphers 
Allows you to use the symmetric cipher you feel most comfortable with. 
Includes: Cast, Blowfish, RC4, RC5, RC6, Twofish and Rijndael. 
160 bit symmetric keys. Each message uses a independent symmetric key which is
the hash of the shared key and a 128 bit random SALT. 

File Encryption 
Simple to use file encryption routines. 

Compact 
The executable is only about 50 kb. The size is growing slowly as new features
are added, although right now it's quite comparable to the popular cryptosystems
[only 75 times smaller]. 

Any input will be appreciated.
-- 
Thanks, Richard

--

From: [EMAIL PROTECTED] (wtshaw)
Subject: Re: What part of 'You need the key to know' don't you people get?
Date: Thu, 02 Dec 1999 11:36:08 -0600

In article <[EMAIL PROTECTED]>, "Douglas A. Gwyn"
<[EMAIL PROTECTED]> wrote:

> wtshaw wrote:
> > [EMAIL PROTECTED] (Johnny Bravo) wrote:
> > > The burden of proof is on the claimant.  If has a point to make,
> > > it is up to him to prove he is right, it is not up to us to prove
> > > him wrong.
> > Well, you might be well liked in a class on legalities, but, ...
> 
> Johnny Bravo is right and you are wrong.  If scientists had to take
> seriously every crackpot claim, they'd never have time to make any
> real progress.  It is a simple matter of practicality that the
> proponent of a new idea that challenges established knowledge needs
> to make a *convincing* case for his idea, so that at least some
> scientists will be motivated to look into it.

There are so many cases of everybody being wrong when someone else is
right.  You honestly cannot reject a single detractor on sight.  I assure
you that I want to see evidence of his claims if possible, or define them
at least worth more study. The last thing I am going to do is reject
claims if there is reason to believe that they might be true. Being open
to such things may seem a burden, but it is a requirement nonetheless.

Personaly, I have a few rather unpopular ideas myself, backed up by my
experience; if they prove accurate according to ad

Cryptography-Digest Digest #664

1999-12-02 Thread Digestifier

Cryptography-Digest Digest #664, Volume #10   Thu, 2 Dec 99 12:13:01 EST

Contents:
  Re: What part of 'You need the key to know' don't you people get? (SCOTT19U.ZIP_GUY)
  Hey, NSA! Venona html errors! ("John K. Taber")
  Re: Elliptic Curve Public-Key Cryptography (DJohn37050)
  Re: What part of 'You need the key to know' don't you people get? (Johnny Bravo)
  Re: been a while since I used pgp (Johnny Bravo)
  Re: Encrypting short blocks (Eric Lee Green)
  Re: Pleasantville: civilty under duress ([EMAIL PROTECTED])
  Re: The $10,000.00 contesta (Bruce Schneier)
  Re: Elliptic Curve Public-Key Cryptography (Bruce Schneier)
  Re: Elliptic Curve Public-Key Cryptography (DJohn37050)
  Re: What part of 'You need the key to know' don't you people get? (wtshaw)
  Re: Elliptic Curve Public-Key Cryptography (David Wagner)
  Re: Random Noise Encryption Buffs (Look Here) (Guy Macon)
  Re: Noise Encryption ("Tim Wood")



From: [EMAIL PROTECTED] (SCOTT19U.ZIP_GUY)
Subject: Re: What part of 'You need the key to know' don't you people get?
Date: Thu, 02 Dec 1999 15:10:00 GMT

In article <[EMAIL PROTECTED]>, "Douglas A. Gwyn" <[EMAIL PROTECTED]> wrote:
>Brian Chase wrote:
>> I think what I'm finding most disturbing, if not just outright disgusting,
>> is how quickly disregarded are Scott's challenges to the conventions of
>> the cryptology community.  Sure he's an asshole, but as a community is it
>> not true that we don't conclusively know how secure the contemporary
>> algorithms are?
>
>Neither does D.Scott!  The main problem with his arguments is that
>he asserts weaknesses in everybody's encryption schemes except his,
>but doesn't *demonstrate* the weaknesses.  When he claims, for
>example, that CBC itself creates exploitable weaknesses, yet there
>happen to be solid mathematical papers demonstrating that CBC used
>with a *strong* block cipher is not substantially weaker than the
>block cipher by itself, it is incumbent on *him* to prove his claim,
Again I see the assholes misquote me. I never said that
CBC makes a cipher weaker. What I have said is that the diffusion
is not more than 2 blocks. So that an attacler using a small number of
blocks would never have to look at the whole file. Since all the 3 letter
modes that you dumb people ever use really add very little strength
the the cipher. I even give examples that show the information is not
distributed through the whole file. Most are to stupid to understand this
fact. Of those smart enough to understand most don't seem to care.
  In the three letter modes when some one does even a partical plain
text attack you can get the input output pairs to the underlying 
blokc cipher. These may or may not be of use to the person breaking
the cipher. With 3 rounds of "wrapped PCBC" this information is not easily
available. So it can't be used. One is forced to examine the encryption
as a whole. Something that the nomral block chaining methods have 
gone out of there way  to avoid.  To me the reason is obvious.
The NSA has done a good job of keeping people stupid about using
chaining to secure a ciper.


>or at least to exhibit an error in the previous work that proved the
>opposite.  That's not only standard professional practice, it's
>plain common sense.  Since he doesn't make a convincing case,
>preferring to curse and challenge the integrity of anyone who
>disagrees with him, it is not surprising that he is being almost
>entirely ignored by the professional community.

  I guess I just like to call a spade a spade big fucking deal.
you can call it a shovel.





David A. Scott
--

SCOTT19U.ZIP NOW AVAILABLE WORLD WIDE
http://www.jim.com/jamesd/Kong/scott19u.zip

Scott famous encryption website NOT FOR WIMPS
http://members.xoom.com/ecil/index.htm

Scott rejected paper for the ACM
http://members.xoom.com/ecil/dspaper.htm

Scott famous Compression Page WIMPS allowed
http://members.xoom.com/ecil/compress.htm

**NOTE EMAIL address is for SPAMERS***

--

From: "John K. Taber" <[EMAIL PROTECTED]>
Subject: Hey, NSA! Venona html errors!
Date: Thu, 2 Dec 1999 08:18:50 -0600

You have duplicate gif names on the Aug 43 page, for the 12th and
19th. Are the duplicates supposed to be, or is this an error?

Also, there are apparent html errors on the Jul 43 page that
cause non-selected hyperlinks to appear as if selected.

Finally, you really need a webmaster email address for queries
like this. How about it?
 
--
Consuming is dirty business, but somebody has to do it. Robert McTeer


--

From: [EMAIL PROTECTED] (DJohn37050)
Subject: Re: Elliptic Curve Public-Key Cryptography
Date: 02 Dec 1999 14:52:25 GMT

For info on coming up with crypto schemes based on math primitives, see IEEE
P1363.  I agree there are many factors to consider and many traps to avoid.

Regarding timings, this is not my area of expertise.  Certicom 

Cryptography-Digest Digest #663

1999-12-02 Thread Digestifier

Cryptography-Digest Digest #663, Volume #10   Thu, 2 Dec 99 09:13:01 EST

Contents:
  Avoiding bogus encryption products: Snake Oil FAQ (C Matthew Curtin)



From: C Matthew Curtin <[EMAIL PROTECTED]>
Crossposted-To: 
alt.security,comp.security,comp.infosystems,comp.answers,sci.answers,alt.answers,news.answers
Subject: Avoiding bogus encryption products: Snake Oil FAQ
Date: 2 Dec 1999 13:41:38 GMT

URL: http://www.interhack.net/people/cmcurtin/snake-oil-faq.html
Version: 1.9
Archive-name: cryptography-faq/snake-oil
Posting-Frequency: monthly

  Snake Oil Warning Signs:
Encryption Software to Avoid

   Copyright © 1996-1998
Matt Curtin <[EMAIL PROTECTED]>

   April 10, 1998

Contents

   * Contents
   * Introduction
   * Basic Concepts
o Symmetric vs. Asymmetric Cryptography
o Secrecy vs. Integrity: What are you trying to protect?
o Key Sizes
o Keys vs. Passphrases
o Implementation Environment
   * Snake Oil Warning Signs
o ``Trust Us, We Know What We're Doing''
o Technobabble
o Secret Algorithms
o Revolutionary Breakthroughs
o Experienced Security Experts, Rave Reviews, and Other Useless
  Certificates
o Unbreakability
o One-Time-Pads
o Algorithm or product X is insecure
o Recoverable Keys
o Exportable from the USA
o ``Military Grade''
   * Other Considerations
   * Glossary
   * Index
   * References

Administrativia

Distribution

Distribution of this document is unlimited. We're specifically trying to
reach people who are not experts in cryptography or security but find
themselves making decisions about what sorts of crypto (if any) to use, both
for their organizations and for themselves.

The Snake Oil FAQ is posted monthly to sci.crypt, alt.security,
comp.security, comp.answers, and comp.infosystems. It is available in
PostScript and PDF form (ideal for printing) via the web at

 http://www.interhack.net/people/cmcurtin/snake-oil-faq.ps
 http://www.interhack.net/people/cmcurtin/snake-oil-faq.pdf

and HTML at

 http://www.interhack.net/people/cmcurtin/snake-oil-faq.html

Disclaimer

All contributors' employers will no doubt disown any statements herein.
We're not speaking for anyone but ourselves.

This is a compilation of common habits of snake oil vendors. It cannot be
the sole method of rating a security product, since there can be exceptions
to most of these rules. From time to time, a reputable vendor will produce
something that is actually quite good, but will promote it with braindead
marketing techniques. But if you're looking at something that exhibits
several warning signs, you're probably dealing with snake oil.

Every effort has been made to produce an accurate and useful document, but
the information herein is completely without warranty. This is a
work-in-progress; feedback is greatly appreciated. If you find any errors or
otherwise wish to contribute, please contact the document keeper, Matt
Curtin <[EMAIL PROTECTED]>

Document History

With the rise in the number of crypto products came a rise in the number of
ineffective or outright bogus products. After some discussion about this on
the cypherpunks list, Robert Rothenburg <[EMAIL PROTECTED]> wrote the
first iteration of the Snake Oil FAQ. Matt Curtin took the early text and
munged it into its current state with the help of the listed contributors
(and probably some others whose names have inadvertently missed. Sorry in
advance, if this is the case.)

Contributors

The following folks have contributed to this FAQ.
Jeremey Barrett <[EMAIL PROTECTED]>
Steven M. Bellovin <[EMAIL PROTECTED]>
Matt Blaze <[EMAIL PROTECTED]>
Bo Dvmstedt <[EMAIL PROTECTED]>
Gary Ellison <[EMAIL PROTECTED]>
<[EMAIL PROTECTED]>
<[EMAIL PROTECTED]>
Larry Kilgallen <[EMAIL PROTECTED]>
Dutra Lacerda <[EMAIL PROTECTED]>
Felix Lee <[EMAIL PROTECTED]>
Colin Plumb <[EMAIL PROTECTED]>
Jim Ray <[EMAIL PROTECTED]>
Terry Ritter <[EMAIL PROTECTED]>
Robert Rothenburg <[EMAIL PROTECTED]>
Adam Shostack <[EMAIL PROTECTED]>
Rick Smith <[EMAIL PROTECTED]>
Randall Williams <[EMAIL PROTECTED]>

Introduction

Good cryptography is an excellent and necessary tool for almost anyone. Many
good cryptographic products are available commercially, as shareware, or
free. However, there are also extremely bad cryptographic products which not
only fail to provide security, but also contribute to the many
misconceptions and misunderstandings surrounding cryptography and security.

Why ``snake oil''? The term is used in many fields to denote something sold
without consideration of its quality or its ability to fulfill its vendor's
claims. This term originally applied to elixirs sold in traveling medicine
shows. The salesmen would claim their elixir would cure just 

Cryptography-Digest Digest #662

1999-12-02 Thread Digestifier

Cryptography-Digest Digest #662, Volume #10   Thu, 2 Dec 99 09:13:01 EST

Contents:
  Re: One Round Block Cipher and 8-bit block Cipoher (Scott Fluhrer)
  Re: Use of two separate 40 bit encryption schemes (Bill Unruh)
  Re: Encrypting short blocks (Markus Peuhkuri)
  Re: Elliptic Curve Public-Key Cryptography (Paul Rubin)
  Re: Decyption proof cellphones in Europe? [x3] (Gurripato)
  Re: One round or  8-bit block cipher (Thomas Pornin)
  Re: A dangerous question (Guy Macon)
  Re: more about the random number generator (CLSV)
  Re: Random Noise Encryption Buffs (Look Here) (Anthony Stephen Szopa)
  Re: The $10,000.00 contesta (Alan Braggins)
  Re: been a while since I used pgp ("Julian LEWIS")
  dictionary ("Olaf Dokter")
  Will ScramDisk recover ? >> After another round of tests ... YES, it  
([EMAIL PROTECTED])



From: Scott Fluhrer <[EMAIL PROTECTED]>
Subject: Re: One Round Block Cipher and 8-bit block Cipoher
Date: Thu, 02 Dec 1999 07:23:00 GMT

In article <[EMAIL PROTECTED]>,
Seongtaek Chee <[EMAIL PROTECTED]> wrote:

>(a) Suppose I use an 1-round  block cipher
> with
>1)  128-bit key addition
>2)  a large S-box(128 x 128, e.g., x^{-1} in GF(2^{64}),
> which can be calculated directly, even though very slow).
> Is it safe?
> Which attacks can be considered?
Is step 2 independent of the key?  If so, then the attacker obtains a
single plaintext/ciphertext pair, and then applies the inverse of step
2 to the ciphertext.  The difference between that and the plaintext is
the key.

Hint: there's very little point in doing key-independent operations
at the very front or at the very end of a block cipher.
>
>
> (b) Suppose I use a 64-round block cipher
>   with
> 1) 128-bit key
> 2) 8-bit Input/Output size.
> Is it safe?
> Which attacks can be considered?
Well, the attack obtains several (say, 200 bytes worth) of known
plaintext/ciphertext.  Then, for any unknown ciphertext, the
ciphertext blocks are likely to appear somewhere in the known text,
and so can be looked up.  This is called a 'code-book' attack, and
is why serious block ciphers have blocks of at least 64 bit.

(Actually, for a block that small, the attacker might very well
attack it as a Caesarian cipher, without any known plaintext.
However, this attack doesn't generalize quite as well).

-- 
poncho


 

--

From: [EMAIL PROTECTED] (Bill Unruh)
Subject: Re: Use of two separate 40 bit encryption schemes
Date: 2 Dec 1999 07:48:39 GMT

>>as I do not live in the land of the free, I'm not permitted to have
>>more than 40 bit DES 

By whom? Do you also not read Playboy since many countries around the
world ban it? Do you refuse to read about Tibet because China does not
like it? Why do you care what the USA thinks?


--

From: Markus Peuhkuri <[EMAIL PROTECTED]>
Subject: Re: Encrypting short blocks
Date: 02 Dec 1999 10:07:22 +0200

> "w" == wtshaw  <[EMAIL PROTECTED]> writes:

Thanks for all who replied.  One thing I didn't remember to
write up was thet stream cipher or OTPs are not suitable for
my application.  As far I've understand there the result
depends on order of blocks (or data).  While this is generally
desirable property of encryption, it is not in my case.

What I want is following property: given message M1 (length N
bits) produces same encrypted message E1 (length N bits) every
time run.  Message M2 produces message E2, which is different
from E1 iff message M2 is different from M1.  However, I'm
willing to accept some probability of collisions, less than
1/1000 (different messages M1 and M2 produce same result E1).

w> algorithm.  When you change an algorithm, you have a different

I took look at blowfish, but I don't have knowledge if it is
possible to modify it to use shorter block lengths than 64
bits _without_ weakening security.  Maybe I'll have try to
find out if it is technicaly feasible.

w> Pick a block length, pick a usable keylength, design a good
w> algorithm, case closed.

As I're read enough about poor implementations, I would not
risk spending two years of my life in restricted freedom.
I would like to make sure.
-- 
Markus Peuhkuri ! [EMAIL PROTECTED] ! http://www.iki.fi/puhuri/

Never underestimate the power of human stupidity
  ... and don't forget you are a human too.

--

From: [EMAIL PROTECTED] (Paul Rubin)
Subject: Re: Elliptic Curve Public-Key Cryptography
Date: 2 Dec 1999 08:41:31 GMT

In article <[EMAIL PROTECTED]>,
DJohn37050 <[EMAIL PROTECTED]> wrote:
>Regarding RW being shown to be equivalent to factoring, as shown by the recent
>breaks of ISO 979