Cryptography-Digest Digest #664

2001-02-09 Thread Digestifier

Cryptography-Digest Digest #664, Volume #13   Fri, 9 Feb 01 17:13:00 EST

Contents:
  Re: Factoring (and not the Philippino :) (Tom St Denis)
  Re: Different cipher type ("Paul Pires")
  Re: Mod function (Jerry Coffin)
  Re: Different cipher type ("Paul Pires")
  Re: relative key strength private vs public key (Steve Portly)
  Re: relative key strength private vs public key (Thomas Kellar)
  Re: Factoring (and not the Philippino :) (DJohn37050)
  Re: Factoring (and not the Philippino :) (DJohn37050)
  Re: Different cipher type ("Douglas A. Gwyn")
  Re: Different cipher type ("Paul Pires")
  Re: relative key strength private vs public key ("Douglas A. Gwyn")
  Re: Encrypting Predictable Files ("Joseph Ashwood")
  Re: Factoring (and not the Philippino :) (John Savard)
  Re: relative key strength private vs public key ("Joseph Ashwood")
  Re: Factoring (and not the Philippino :) ("Douglas A. Gwyn")



From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: Factoring (and not the Philippino :)
Date: Fri, 09 Feb 2001 18:58:17 GMT

In article <[EMAIL PROTECTED]>,
  "Douglas A. Gwyn" <[EMAIL PROTECTED]> wrote:
> DJohn37050 wrote:
> > if e = 3 then p (and q) = 2 mod 3 which gives more info about the values
>
> I have some general thoughts about potential RSA cracking:
> (1) N is computed from p and q, e and d are computed via z.  It is
> often said that cracking an RSA encryption is equivalent to factoring
> N, but in practice one is faced with a known (N,e) and all that is
> needed for a crack is *some* d' (not necessarily the d maintained
> as a secret by the sender) that has the relevant inverse property,
> not p and q.  Is it a theorem that knowing (N,e,d) allows a fast
> recovery of p and q?  If not, then the notion that cracking RSA is as
> hard as factoring needs to be rethought.


The problem is while there are other 'd' that will decrypt JUST the same as
another, they are actually multiples of lcm(p-1,q-1).  I.e 3m mod m = 0 just
like m mod m = 0.  Thus 3^(n-1) mod n = 1 just like 3^3(n-1) mod n = 1.

Tom


Sent via Deja.com
http://www.deja.com/

--

From: "Paul Pires" <[EMAIL PROTECTED]>
Subject: Re: Different cipher type
Date: Fri, 9 Feb 2001 11:21:55 -0800


Douglas A. Gwyn <[EMAIL PROTECTED]> wrote in message 
news:[EMAIL PROTECTED]...
> Michael Brown wrote:
> > "Douglas A. Gwyn" <[EMAIL PROTECTED]> wrote ...
> > > Before spending much more time in this direction, read what Knuth
> > > had to say about his youthful attempt at a "super-random" generator
> > > (the Art of Computer Programming, Vol. 2: Seminumerical Algorithms).
> > Unfortunately, I can't get hold of this book (don't have it and nor do local
> > bookstores). Could you tell me what he had to say?
>
> It ought to be in any reasonable computer science library.
>
> Basically, he described an algorithm that tried to combine
> "at random" several methods of pseudorandom generation,
> with the idea that the result would be more random than the
> individual methods.  When he actually implemented it, right
> away he found that it tended to get stuck in very short
> cycles.  The moral was, methods of generating random numbers
> should not be designed at random..  Half of the book is
> concerned with a careful investigation of pseudorandom number
> generation.

Isn't this implicit in the context of working with a deterministic process?
There is a tension between mutually exclusive goals. Decouple the behavior
of the machine from the content of it's state enough that it is not predictable
but don't loose the richness of the hard won complexity of how the state
evolves. That probably doesn't make a lot of sense.

I guess I'm trying to describe an impression I have of how this works. To me,
It seems like the difficulty and art involved is in compromising and
complementing. Absolutely treating any routine to produce a desired effect
is likely to fail as this focus will result in the exposure of another problem.
Often, you hear people pound on the basics of needing number theory
knowledge and an understanding of cryptanalysis to design good ciphers
but an obvious point is missed. You need to be a good designer (in general)
also. In Mechanical Engineering, there is a distinction between Designers,
Engineers, Design Engineers and Proffesors. Maybe not at the University
level but definately within the trade. Different skill sets and focus. The
problem with this being such a new and specialized (and generally secretive)
feild is that we hear from the professors (No slight intended) often but don't
hear the w

Cryptography-Digest Digest #664

2000-09-12 Thread Digestifier

Cryptography-Digest Digest #664, Volume #12  Tue, 12 Sep 00 18:13:01 EDT

Contents:
  Re: sac fullfilling decorelated functions (Tom St Denis)
  Re: nice simple function (Tom St Denis)
  Re: Steganography and secret sorting ("Douglas A. Gwyn")
  Re: Need Tiger hash results for sample test data ([EMAIL PROTECTED])
  Re: nice simple function (Tom St Denis)
  Re: Intel's 1.13 MHZ chip ([EMAIL PROTECTED])
  Re: Steganography and secret sorting (Matthew Skala)
  Re: Weaknesses in this algorithm? (ArchimeDES)
  search for better serpent sboxes (Tom St Denis)
  Re: nice simple function (Simon Johnson)
  Re: search for better serpent sboxes (Simon Johnson)
  Re: Problem with Tiger hash algorithm and binary files (Konrad Podloucky)
  Re: Known Plain Text Attack (Terry Ritter)



From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: sac fullfilling decorelated functions
Date: Tue, 12 Sep 2000 20:07:13 GMT

In article <[EMAIL PROTECTED]>,
  Mike Rosing <[EMAIL PROTECTED]> wrote:
> Tom St Denis wrote:
> >
> > Let's take F(x) = a.x + b in GF(2)^32, now we want to know for any
> > multiple of 'a' in the same field what is the prob of at laest 16
bits
> > being set... so I take out some new finite I learnt and plug in (32
> > choose 16)/2^32 = 2^-2.837.  This means about 1 in 6 will be SAC
> > fullfilling functions.
> >
> > Over the entire multiplcation we find 32/6 ~ 5.3 which means of the
32
> > multiples of 'a' only 5 are sac fullfilling.  If 'a' is random there
> > distribution should be random (?).  Now consider the lower bits,
such
> > as with only four bits set.  We find them with a prob of 2^-16.865
much
> > less then with 16 bits.
> >
> > In any GF multiply the chances of any being of only four bits is
about
> > 2^-11 or 1 in 2048.  This means that GF multiplication is a closely-
sac-
> > like function most of the time, and for a fraction of the time not.
> >
> > Can this be used to extract information from the function in those
> > specific cases (extreme cases?)
>
> F is linear.  That's a much bigger problem :-)

Actually in Vaudenays paper if 'a,b' is random the function is immune
to linear cryptanalysis.

Tom


Sent via Deja.com http://www.deja.com/
Before you buy.

--

From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: nice simple function
Date: Tue, 12 Sep 2000 20:09:03 GMT

In article <[EMAIL PROTECTED]>,
  Mike Rosing <[EMAIL PROTECTED]> wrote:
> Tom St Denis wrote:
> > f''(x) = f'(x ++ f(x)) where '++' represents modular integer
addition.
> > We now get f''(x) = f'(x ++ (a.x + b)) = c.(x ++ (a.x + b)) + d =
c.x
> > ++ c.(a.x + b) + d = c.x ++ (c.a.x + c.b) + d
> >
> > From what I can tell c.x cannot be grouped with c.a.x, which means
we
> > have an output that is a function of 'c' and 'a'.  Also that c.b
cannot
> > be grouped with 'd', but since they are not a function of the input
can
> > we let 'b' be zero and just have f''(x) = (c.x ++ c.a.x) + d
> >
> > Which leads me to f''(x) = (a.x ++ b.x) + c as a new decorrelated
> > function.  (Assuming a, b != 0).
> >
> > Am I nuts or what?  Please comment :-)
>
> Plot it and see.  Try 4 bits, so you have 4*4*4*4 possible pairs ( a
nice
> round number!) for each of a, b, c and x.  What is the distribution of
> f''(x) as a function of a, c and x.  I'm assuming the modulus is 2^4
as
> well, but you could really have fun by changing that :-)

The modulus is a degree 5 primitive polynomial in GF(2), or just the
integer 17 and use 1-16 as elements.

I will play around with it.

Tom


Sent via Deja.com http://www.deja.com/
Before you buy.

--

From: "Douglas A. Gwyn" <[EMAIL PROTECTED]>
Subject: Re: Steganography and secret sorting
Date: Tue, 12 Sep 2000 19:40:53 GMT

Mok-Kong Shen wrote:
> Sorry, I am not yet able to understand. Could you explain
> with a database of, say, 5 or 10 entries? Do you assume
> that the same database (without permutation) is available
> to both partners? Thanks.

The hard part is encoding the hidden message in terms of
a permutation.  Supposing that to have been done, so the
permuted order for the coded message is 4,1,5,3,2 then 
he transmitted database might be

Texas
Alaska
Vermont
Ohio
Wyoming

which when sorted (on the final letter in this example) is

Alaska
Wyoming
Ohio
Texas
Vermont

The reordering from the sorted database to the transmitted
one is readily found to be 4,1,5,3,2 which recovers the
coded message.  Then whatever coding was ap

Cryptography-Digest Digest #664

2000-04-29 Thread Digestifier

Cryptography-Digest Digest #664, Volume #11  Sat, 29 Apr 00 19:13:01 EDT

Contents:
  Re: sboxes for the bored... (Terry Ritter)
  Re: factor large composite (Jerry Coffin)
  Re: sboxes for the bored... (Tom St Denis)
  Re: sboxes for the bored... (Tom St Denis)
  How safe am I using a subset of the bytes returned by SHA-1? (Mark Thomson)
  Re: How safe am I using a subset of the bytes returned by SHA-1? (Tom St Denis)
  Re: A naive question (Bryan Olson)
  Re: U-571 movie (OT) (Tom St Denis)
  the security of scramdisk (EP847)
  Re: Biometrics and public/private key encryption (Diet NSA)
  Re: Help: encrypting bit fields (Francois Grieu)
  Re: Intel drops serial number (Roger)
  Re: U-571 movie (Diet NSA)
  Re: Magnetic Remenance on hard drives. ("Trevor L. Jackson, III")
  Re: new Echelon article (Diet NSA)
  Re: U-571 movie (OT) ("Stou Sandalski")
  Re: Janet and John learn about bits (was Re: Problems with OAP-L3) (Richard 
Heathfield)
  What are SBoxes? ("Monolo")
  Re: the security of scramdisk (Ron Yakmile)



From: [EMAIL PROTECTED] (Terry Ritter)
Subject: Re: sboxes for the bored...
Date: Sat, 29 Apr 2000 20:27:23 GMT


On Sat, 29 Apr 2000 10:29:05 GMT, in <[EMAIL PROTECTED]>,
in sci.crypt Tom St Denis <[EMAIL PROTECTED]> wrote:

>Terry Ritter wrote:
>> 
>> On Sat, 29 Apr 2000 00:05:55 GMT, in <[EMAIL PROTECTED]>, in
>> sci.crypt "Douglas A. Gwyn" <[EMAIL PROTECTED]> wrote:
>> 
>> >Terry Ritter wrote:
>> >> Measuring Boolean function nonlinearity is well-known technology.
>> >
>> >However, there are apparently different measures of nonlinearity;
>> 
>> Yes, of course there would be different measures, in the same sense as
>> there are many different forms of linearity.
>> 
>> >are they strictly equivalent?
>> 
>> Within the context of Boolean functions (that is, n-bit to 1-bit
>> lookup tables), such functions are likely equivalent.  The extension
>> to n-bit to m-bit tables, in which we measure each bit-column
>> independently, seems fairly common, if that is what we want to do.
>> Now, we might well *want* to do something else in which the sequences
>> are not measured independently, but I'm unaware of a useful
>> cryptographic measure for anything like that.
>
>Well meseasuring n by 1 sbox non-linearnity is not what I am trying todo
>here.  I implemented a WT transform that goes thru all possible inputs
>and outputs.  Could you just look at my code to see I implemented the WT
>properly please?

My first instinct is to say: "NO!  Form some test vectors and test
your work and they you will know, and also then you can fix it to make
it work right if it doesn't."  

I *can't* just *look* at code and see if it is right; few people can.
To see if code is right I have to *implement* the code, and the test
vectors, and see if the code does what it is supposed to do.  I HAVE
ALREADY DONE THAT FOR MY CODE!  And that code, at least, is in the
JavaScript page.  Just view the source!  

All that said, I would have looked at your code had I known were it
was.  There is a reason URL's appear in newsgroup articles!  I looked
back at your 3 or 4 previous contributions to this discussion, and saw
my URL's repeated, but nothing from you.  So WHAT CODE?  

---
Terry Ritter   [EMAIL PROTECTED]   http://www.io.com/~ritter/
Crypto Glossary   http://www.io.com/~ritter/GLOSSARY.HTM


--

From: Jerry Coffin <[EMAIL PROTECTED]>
Subject: Re: factor large composite
Date: Sat, 29 Apr 2000 14:42:31 -0600

In article <[EMAIL PROTECTED]>, 
[EMAIL PROTECTED] says...

[ ... ] 

>   Wasn't thinking of NFS.  Simple trial and error division on assigned
> blocks of divisors to prevent duplication of effort.  Nearly no chance
> of success, but what the hell.  You are using other people's computers
> to do the work.  And a nice payoff if you get lucky, and no real cost
> if you don't.  Sort of like getting a free lotto ticket.

This isn't reasonable either.  If you're going to try to distribute a 
factoring job widely, it looks to me like the elliptical curve method 
is what you really want to use.  Even when you run it on a single 
machine, ECM is still basically executed as a large number of pieces, 
each of whihc is basically independent from the others.  Eventually, 
one of them turns up an answer.

If you're working on a number large enough that NFS is difficult to 
contemplate, "eventually" will be a LONG time, but at least dividing 
up the work to make the attempt is relatively easy.

-- 
Later,
Jerry.
 
The universe is a figment of its own imagination.

-

Cryptography-Digest Digest #664

1999-12-02 Thread Digestifier

Cryptography-Digest Digest #664, Volume #10   Thu, 2 Dec 99 12:13:01 EST

Contents:
  Re: What part of 'You need the key to know' don't you people get? (SCOTT19U.ZIP_GUY)
  Hey, NSA! Venona html errors! ("John K. Taber")
  Re: Elliptic Curve Public-Key Cryptography (DJohn37050)
  Re: What part of 'You need the key to know' don't you people get? (Johnny Bravo)
  Re: been a while since I used pgp (Johnny Bravo)
  Re: Encrypting short blocks (Eric Lee Green)
  Re: Pleasantville: civilty under duress ([EMAIL PROTECTED])
  Re: The $10,000.00 contesta (Bruce Schneier)
  Re: Elliptic Curve Public-Key Cryptography (Bruce Schneier)
  Re: Elliptic Curve Public-Key Cryptography (DJohn37050)
  Re: What part of 'You need the key to know' don't you people get? (wtshaw)
  Re: Elliptic Curve Public-Key Cryptography (David Wagner)
  Re: Random Noise Encryption Buffs (Look Here) (Guy Macon)
  Re: Noise Encryption ("Tim Wood")



From: [EMAIL PROTECTED] (SCOTT19U.ZIP_GUY)
Subject: Re: What part of 'You need the key to know' don't you people get?
Date: Thu, 02 Dec 1999 15:10:00 GMT

In article <[EMAIL PROTECTED]>, "Douglas A. Gwyn" <[EMAIL PROTECTED]> wrote:
>Brian Chase wrote:
>> I think what I'm finding most disturbing, if not just outright disgusting,
>> is how quickly disregarded are Scott's challenges to the conventions of
>> the cryptology community.  Sure he's an asshole, but as a community is it
>> not true that we don't conclusively know how secure the contemporary
>> algorithms are?
>
>Neither does D.Scott!  The main problem with his arguments is that
>he asserts weaknesses in everybody's encryption schemes except his,
>but doesn't *demonstrate* the weaknesses.  When he claims, for
>example, that CBC itself creates exploitable weaknesses, yet there
>happen to be solid mathematical papers demonstrating that CBC used
>with a *strong* block cipher is not substantially weaker than the
>block cipher by itself, it is incumbent on *him* to prove his claim,
Again I see the assholes misquote me. I never said that
CBC makes a cipher weaker. What I have said is that the diffusion
is not more than 2 blocks. So that an attacler using a small number of
blocks would never have to look at the whole file. Since all the 3 letter
modes that you dumb people ever use really add very little strength
the the cipher. I even give examples that show the information is not
distributed through the whole file. Most are to stupid to understand this
fact. Of those smart enough to understand most don't seem to care.
  In the three letter modes when some one does even a partical plain
text attack you can get the input output pairs to the underlying 
blokc cipher. These may or may not be of use to the person breaking
the cipher. With 3 rounds of "wrapped PCBC" this information is not easily
available. So it can't be used. One is forced to examine the encryption
as a whole. Something that the nomral block chaining methods have 
gone out of there way  to avoid.  To me the reason is obvious.
The NSA has done a good job of keeping people stupid about using
chaining to secure a ciper.


>or at least to exhibit an error in the previous work that proved the
>opposite.  That's not only standard professional practice, it's
>plain common sense.  Since he doesn't make a convincing case,
>preferring to curse and challenge the integrity of anyone who
>disagrees with him, it is not surprising that he is being almost
>entirely ignored by the professional community.

  I guess I just like to call a spade a spade big fucking deal.
you can call it a shovel.





David A. Scott
--

SCOTT19U.ZIP NOW AVAILABLE WORLD WIDE
http://www.jim.com/jamesd/Kong/scott19u.zip

Scott famous encryption website NOT FOR WIMPS
http://members.xoom.com/ecil/index.htm

Scott rejected paper for the ACM
http://members.xoom.com/ecil/dspaper.htm

Scott famous Compression Page WIMPS allowed
http://members.xoom.com/ecil/compress.htm

**NOTE EMAIL address is for SPAMERS***

--

From: "John K. Taber" <[EMAIL PROTECTED]>
Subject: Hey, NSA! Venona html errors!
Date: Thu, 2 Dec 1999 08:18:50 -0600

You have duplicate gif names on the Aug 43 page, for the 12th and
19th. Are the duplicates supposed to be, or is this an error?

Also, there are apparent html errors on the Jul 43 page that
cause non-selected hyperlinks to appear as if selected.

Finally, you really need a webmaster email address for queries
like this. How about it?
 
--
Consuming is dirty business, but somebody has to do it. Robert McTeer


--

From: [EMAIL PROTECTED] (DJohn37050)
Subject: Re: Elliptic Curve Public-Key Cry

Cryptography-Digest Digest #664

1999-06-05 Thread Digestifier

Cryptography-Digest Digest #664, Volume #9Sat, 5 Jun 99 13:13:03 EDT

Contents:
  Re: New Computer & Printer for Dave Scott (Illia Kuriakin)
  Function Feedback Registers ([EMAIL PROTECTED])
  Re: Viability of encrypted flash cards? ([EMAIL PROTECTED])
  Re: Challenge to SCOTT19U.ZIP_GUY ([EMAIL PROTECTED])
  Re: Challenge to SCOTT19U.ZIP_GUY ([EMAIL PROTECTED])
  Re: 8Bit encryption code. Just try and break it. - code3.ecr (0/1) 
([EMAIL PROTECTED])
  Re: The BRUCE SCHNEIER  Tirade ([EMAIL PROTECTED])
  Re: DES Effective Security Q ("karl malbrain")
  Re: Challenge to SCOTT19U.ZIP_GUY (Frank Gifford)
  Re: OTP Problems ([EMAIL PROTECTED])
  Re: New Computer & Printer for Dave Scott ([EMAIL PROTECTED])



From: Illia Kuriakin <[EMAIL PROTECTED]>
Subject: Re: New Computer & Printer for Dave Scott
Date: Sat, 05 Jun 1999 06:57:59 -1000

I will donate $100 for David Scott's new computer.
We can load it with a C compiler of Our choice,
and a spell checker.

If we get 9 donors of $100 each, we can purchase it
and ship it to David as a completed package. I am serious, 
please sign up today.

--

From: [EMAIL PROTECTED]
Subject: Function Feedback Registers
Date: Sat, 05 Jun 1999 13:45:46 GMT

I was wondering if there are references to FFR (Function Feedback
Registers).  My example (in C below) works with four byte size
registers, but unfortunetaly the cycle length is only 2^31.98 so it's
not perfect.  Basically the register works like a LFSR with the taps
but when you shift the cells (they are not nesscessary bits or bytes)
they pass thru a function before resting.  For example the one below
would be

Taps -> f1(x) -> A -> f2(x) -> B -> f3(x) - > C -> f4(x) -> D -> output
(Tapping on A and B)

unsigned char func[4][256], regis[4];
unsigned char clock(void)
{
unsigned char temp, o;

temp = regis[3] ^ regis[0];

o = regis[0];
regis[0] = func[0][(unsigned)regis[1]];
regis[1] = func[1][(unsigned)regis[2]];
regis[2] = func[2][(unsigned)regis[3]];
regis[3] = func[3][(unsigned)temp];

return o;
}

It seems to me that this would be non linear.  And as long as the
tables are private it may have some cryptographic significance
(Although the cycle is not maximal length).

Tom
--
PGP public keys.  SPARE key is for daily work, WORK key is for
published work.  The spare is at
'http://members.tripod.com/~tomstdenis/key_s.pgp'.  Work key is at
'http://members.tripod.com/~tomstdenis/key.pgp'.  Try SPARE first!


Sent via Deja.com http://www.deja.com/
Share what you know. Learn what you don't.

--

From: [EMAIL PROTECTED]
Crossposted-To: alt.security,talk.politics.crypto
Subject: Re: Viability of encrypted flash cards?
Date: Sat, 05 Jun 1999 14:55:42 GMT

On Thu, 03 Jun 1999 22:37:39 GMT, "Cor!"
<[EMAIL PROTECTED]>
wrote:
>>Do you think PGP is used by criminals more than anyone
>>else?
>I don't know; I never thought about it before. Are there any statistics
>on this?

If there were statistics as to the type of messages that PGP is used
on, then that would imply that someone can tell.

I hope not.

--

Date: Fri, 04 Jun 1999 23:52:27 -0400
From: [EMAIL PROTECTED]
Subject: Re: Challenge to SCOTT19U.ZIP_GUY

Tim Redburn wrote:
> 
> On Fri, 04 Jun 1999 20:24:05 GMT, [EMAIL PROTECTED]
> (SCOTT19U.ZIP_GUY) wrote:
> 
> >
> >  I have worked on many aircraft simulations and OFP;s one of the main
> >problems that seems to occur over and over is that other people keep
> >missing the obvious errors in the code becasue most people inheirently
> >put faith on the comments and this leads to major maistakes that take
> >years to find and fix.
> 
> Quite the opposite. Comments tell you what the programmer intended.
> It is then easier then to verify that the code actually works
> as intended. If you don't know what the code was meant to do, how can
> you debug it ?

Actually it's harder than that. Comments often tell you what the
_original_ programmer _originally_ intended.  The secret to good writing
(of any kind) is rewriting.  Rewriting implies that the intentions of
the author evolve during the process.  Thus the final intentions of the
author(s) may be arbitrarily far from the original intentions.

A truism of software maintenance (which is mostly software analysis) is
that the value of comments is often negative.  More often than not.  The
cost of persuing a false trail based on the comments is high.  It can
pollute your concept pool long after you've learned better (holographic
memory effects I suppose).

ThHis explains one of the first rules of maintenance.  Delete the
comments, then study