Cryptography-Digest Digest #674

2001-02-11 Thread Digestifier

Cryptography-Digest Digest #674, Volume #13  Sun, 11 Feb 01 08:13:00 EST

Contents:
  Re: The Kingdom of God (PennGwyn)
  Re: OverWrite freeware completely removes unwanted files from harddrive (Anthony 
Stephen Szopa)
  Re: OverWrite freeware completely removes unwanted files from hard drive (Anthony 
Stephen Szopa)
  Re: Purenoise defeats Man In The Middle attack? (David Schwartz)
  Re: NPC (Bryan Olson)
  Re: CipherText patent still pending (Bryan Olson)
  Re: RSA is not secure in many instances... ([EMAIL PROTECTED])
  Re: ith bit of an LFSR sequence? (Rob Warnock)
  Re: Password authentication with symmetric key exchange 
([EMAIL PROTECTED])
  Re: CipherText patent still pending (Mok-Kong Shen)
  Re: CipherText patent still pending (Mok-Kong Shen)
  Re: Scramdisk, CDR and Win-NT (Daniel James)



From: [EMAIL PROTECTED] (PennGwyn)
Crossposted-To: alt.security,comp.security,alt.2600
Subject: Re: The Kingdom of God
Date: 11 Feb 2001 09:21:27 GMT
Reply-To: [EMAIL PROTECTED]

In article <963tf7$aip$[EMAIL PROTECTED]>, [EMAIL PROTECTED] says...
>
>1. When he was on earth, Jesus taught his followers to pray for God's
>Kingdom. 

  I am unaware of reliable evidence that Jesus was ever on earth, or had 
followers, or what he taught them.  I am reluctant to assume that you were 
present.

>A kingdom is a government that is headed by a king. 

  I think it would be more accurate to say that a kingdom is a region whose 
Head of State is a king OR QUEEN.  Recall that in New Testament times, the 
"kingdoms" of the Middle East were provinces of the Roman Empire.
  A MONARCHY is a government that is headed by a king or queen.  A KINGDOM is 
not.

>God's Kingdom is a special government. It is set up in heaven and will rule
>over this earth. 

  This is unprecedented.  Monarchies rule over kingdoms; empires encompass 
multiple regions which may or may not, individually, be kingdoms.

  According to your opening sentence, Jesus' follwers were not taught to pray 
for God's monarchy or empire, only for his kingdom -- which, as far as I can 
see, can only mean Heaven itself.

>It will sanctify, or make holy, God's name. 

  So God's name is not ALREADY holy?  I'm sure you'll find plenty who have 
trouble with THAT blasphemy.

>It will cause God's will to be done on earth as it is done in heaven.

  Kingdoms don't "cause" events, either.

>http://www.watchtower.org/library/rq/index.htm

  And the relevance to "sci.crypt,alt.security,comp.security,alt.2600" is what, 
exactly?

-- 
=BEGIN GEEK CODE BLOCK=
Version: 3.12
GIT/O d+(-) s:+ a? C++(+++) U@ P@ L+ !E W@ N++ o+ K+ w+++<$ !O M+ !V PS++ PE
Y+ PGP@ t@ 5+ X- R++< tv+ b++ DI++ D G+ e++ h---(-) r? y+++(+*)
==END GEEK CODE BLOCK==


--

From: Anthony Stephen Szopa <[EMAIL PROTECTED]>
Crossposted-To: alt.hacker
Subject: Re: OverWrite freeware completely removes unwanted files from harddrive
Date: Sun, 11 Feb 2001 02:11:46 -0800

Andreas Gunnarsson wrote:
> 
> [talk.politics.crypto and alt.conspiracy removed from crossposting]
> 
> Tom St Denis wrote:
> > I am a student in security and computer science.  Could I see your source
> > code?  I want to learn how this stuff all works!
> 
> On Sat, 10 Feb 2001, Anthony Stephen Szopa wrote:
> > Read the description in the Help Files at http://www.ciphile.com or
> > the instructions with the OverWrite software and read the link that
> > JA Malley posted.
> 
> I checked the web pages, but I can't find any description for how the
> program ensures that the multiple overwrites actually take place. There
> are several ways it could fail for a naive implementation:
> 
> - The OS may allocate new disk blocks when writing the patterns, leaving
>   the old data unaltered
> - The OS may cache the writes, only actually writing the last pattern to
>   disk (or not even that if the file is removed afterwards)
> - The SCSI controller may cache the writes
> 
> I'm interested in how you've solved this.
> 
>Andreas
> 
> --
> Andreas Gunnarsson <[EMAIL PROTECTED]>
> +46 31 7014268


I don't see what you suggest could happen happening.

Give us a specific example where you have written source code that 
says to open a file and write to the file where the computer did not
carry out this instruction.

--

From: Anthony Stephen Szopa <[EMAIL PROTECTED]>
Crossposted-To: talk.politics.crypto,alt.hacker,alt.conspiracy
Subject: Re: OverWrite freeware completely removes unwanted files from hard drive
Date: Sun, 11 Feb 2001 02:16:31 -0800

Hit1Hard wrote:
> 
> Anthony Stephen Szopa wrote:
> >
> 
> > So where are these technologi

Cryptography-Digest Digest #674

2000-09-13 Thread Digestifier

Cryptography-Digest Digest #674, Volume #12  Wed, 13 Sep 00 21:13:01 EDT

Contents:
  Anyone archiving sci.crypt? (Paul Rubin)
  www.curious.4ears (re-post) ("rosi")
  Comments on the re-post ("rosi")
  Re: question on the bible code (Steve)
  Announcement ("rosi")
  Serious joke for rot26 ("rosi")
  Re: Announcement ("rosi")
  Status on U.S. Patent No. 08/941,350, etc. ("rosi")
  Licensing and Selling ("rosi")
  Re: question on the bible code (TaoenChristo)
  Re: question on the bible code (TaoenChristo)
  Looking for Partners (and Investors) ("rosi")
  Looking for Implementation Site ("rosi")
  Hassle-free travel ("rosi")



From: Paul Rubin <[EMAIL PROTECTED]>
Subject: Anyone archiving sci.crypt?
Date: 13 Sep 2000 17:16:49 -0700

Dejanews has taken its older archives offline "temporarily".
They might come back someday, but even if they do, I'm wondering
if anyone else has a sci.crypt archive they're willing to share,
preferably going as far back as possible.

Thanks
Paul

--

From: "rosi" <[EMAIL PROTECTED]>
Subject: www.curious.4ears (re-post)
Date: Wed, 13 Sep 2000 20:46:20 -0400

   I sincerely hope some kind people who can get in touch with Andrew
Odlyzko of AT&T may kindly help me solve (or partially solve) the www
puzzle:
  Where did my e-mail messages to Andrew go?
  Whether there is something that prevents Andrew from telling me
of the receipt of my messages? and
  Why?

   If anybody can get some, I mean any, response from Andrew and let me
know, I would appreciate it very much. Thanks in advance.

   (The following is the background and some details about the WWW
puzzle, in case there is at least one kind person who can help out
there)

   I have been CURIOUS FOR YEARS (about the three W's). It was a number
of years ago when I finally decided to do something about the loose ends
in the sketchy ideas of mine in cryptography and thought that it might
not be a bad idea to discuss the matter with people prominent in the
field. I sent out a bunch of e-mail messages to people whose names one
sees often and whose articles one sees quoted frequently. It wasn't just
the hope of getting blessing, which in the eye of some (including me)
can be so important. I also wanted to make sure that I did not miss
something obvious. Besides, a one-man-shop can often carry ridiculous
stuff, and since in the years from the age of 10 or 11 till about 22,
I like so many of my contemporaries either had no schooling or no proper
schooling, the chance of errors and overlooks is so formidable.

   Messages sent and I waited. I hoped for the best and prepared for the
worst. The best came.

   Of all the people I sent e-mail messages to, three and APPROXIMATELY
a half actually replied! There were courteous reply, touching reply,
helpful reply (with direction to search for help), and above all one
from Andrew that I dreamt of getting. It was simply beyond what I
could have hoped!

   One of the replies was from another highly respected, leading expert
in the field of cryptography. He suggested that I discuss the matter
with Andrew.

   Over the years, the ideas of my cryptographic scheme has been
'leaked', some purposely by me to sci.crypt and I feel no need to
further elaborate here (but I know repetition never bores :)).

   I summarized the main characteristics of my idea in the e-mail
message to Andrew, including the property of 'no equivalent zero-one
set'. Later, in the message detailing the basic idea, I also mentioned
in a vague and brief manner that the underlying problem (of one of the
most secure modes) is to:

  Find all m >= 0 _valid_ subset sum(s) --- given a set
  'of high density'.

In addition, I mentioned 'all-or-nothing' as a tweak so that the
expressed concern (perhaps unjustified) that it is very difficult to
build a viable scheme based on NPc problems may not be a
problem at all.

   Anyway, Andrew replied, saying that if the construct does possess
(some of) the properties I claimed, the scheme would be of interest. I
was simply overwhelmed! (But he wanted details).

   I immediately wrote back in a very brief, nevertheless complete
manner, which I believe could be understood by a layman and quite easy
for the major points I made to be sensed. To be redundant, let me give
it here in summary once more (in a form easiest to understand):

  A subset sum problem.
  Build two (compact) sets X and Y. For simplicity, let X, following
 MH, be superinc in such a way that the subset sum of X allows
 'noise' constructed by elements from Y.
  Build an arbitrary mapping from the subset sums of X to certain
 subset sums of Y, such that the el

Cryptography-Digest Digest #674

2000-04-30 Thread Digestifier

Cryptography-Digest Digest #674, Volume #11  Sun, 30 Apr 00 23:13:00 EDT

Contents:
  Re: Command Line Cypher? ("Jimmy")
  Re: Command Line Cypher? ("Jimmy")
  Re: Command Line Cypher? (Tom St Denis)
  Re: about search and seisure of computers again (jungle)
  Deciphering Playfair (Michael Jarrells)
  Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails onthe net" 
("Garry Anderson")
  Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails onthe net" 
("Garry Anderson")
  Re: How safe am I using a subset of the bytes returned by SHA-1? (stanislav shalunov)
  Re: Command Line Cypher? ([EMAIL PROTECTED])
  Re: Joystick as RNG ("Trevor L. Jackson, III")
  Re: Joystick as RNG (Tom St Denis)
  Re: How would a 15 year old start? (Dan Day)
  Re: Magnetic Remenance on hard drives. ("Marty")
  Re: Science Daily overstates significance? (Diet NSA)
  Re: Command Line Cypher? (Michael J. Fromberger)
  Re: about search and seisure of computers again (Albert P. Belle Isle)



From: "Jimmy" <[EMAIL PROTECTED]>
Subject: Re: Command Line Cypher?
Date: Sun, 30 Apr 2000 19:10:35 -0400

Thanks... the ole XOR encryption... yeah thats pretty secure :)



Richard Heathfield wrote in message
<[EMAIL PROTECTED]>...
>Jimmy wrote:
>>
>> Anyone know of a decent command line stream cypher for *nix and NT?
>>
>
>Here's one. It's so secure it doesn't need a key. It's called SNA-Coil,
>and it works on the same principle as DES. What's more, you don't need a
>separate decryption program. Here's the full source:
>
>#include 
>
>int main(int argc, char **argv)
>{
>  FILE *fpin, *fpout;
>  unsigned char ch;
>
>  if(argc > 2)
>  {
>fpin = fopen(argv[1], "rb");
>if(fpin != NULL)
>{
>  fpout = fopen(argv[2], "wb");
>  if(fpout != NULL)
>  {
>while(fread(&ch, 1, 1, fpin))
>{
>  ch = ~ch;
>  fwrite(&ch, 1, 1, fpout);
>}
>if(ferror(fpin) || ferror(fpout))
>{
>  printf("rats.\n");
>}
>fclose(fpout);
>  }
>  fclose(fpin);
>}
>  }
>
>  return 0;
>}
>
>I defy anyone on this newsgroup to crack SNA-Coil.
>
>
>V ubcr V'z abg gbb yngr sbe Ncevy Sbbyf Qnl 
>
>--
>
>Richard Heathfield
>
>"Usenet is a strange place." - Dennis M Ritchie, 29 July 1999.
>
>C FAQ: http://www.eskimo.com/~scs/C-faq/top.html
>34 K&R Answers: http://users.powernet.co.uk/eton/kandr2/index.html (63
>to go)



--

From: "Jimmy" <[EMAIL PROTECTED]>
Subject: Re: Command Line Cypher?
Date: Sun, 30 Apr 2000 19:16:01 -0400

You wouldnt know where one could find such an old verison of pgp would you?


Tom St Denis wrote in message <[EMAIL PROTECTED]>...
>
>
>Jimmy wrote:
>>
>> Anyone know of a decent command line stream cypher for *nix and NT?
>>
>> JImmy
>
>I think you can get pgp 2.6.2 for both... I dunno off hand.
>
>Tom
>--
>Want your academic website listed on a free websearch engine?  Then
>please check out http://tomstdenis.n3.net/search.html, it's entirely
>free
>and there are no advertisements.



--

From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: Command Line Cypher?
Date: Sun, 30 Apr 2000 23:22:21 GMT



Jimmy wrote:
> 
> Thanks... the ole XOR encryption... yeah thats pretty secure :)

Technically he would have to write it as 'ch ^= 0xff' to get an xor
cipher

And why not?  Looks pretty good to me.

Tom

> 
> Richard Heathfield wrote in message
> <[EMAIL PROTECTED]>...
> >Jimmy wrote:
> >>
> >> Anyone know of a decent command line stream cypher for *nix and NT?
> >>
> >
> >Here's one. It's so secure it doesn't need a key. It's called SNA-Coil,
> >and it works on the same principle as DES. What's more, you don't need a
> >separate decryption program. Here's the full source:
> >
> >#include 
> >
> >int main(int argc, char **argv)
> >{
> >  FILE *fpin, *fpout;
> >  unsigned char ch;
> >
> >  if(argc > 2)
> >  {
> >fpin = fopen(argv[1], "rb");
> >if(fpin != NULL)
> >{
> >  fpout = fopen(argv[2], "wb");
> >  if(fpout != NULL)
> >  {
> >while(fread(&ch, 1, 1, fpin))
> >{
> >  ch = ~ch;
> >  fwrite(&ch, 1, 1, fpout

Cryptography-Digest Digest #674

1999-12-03 Thread Digestifier

Cryptography-Digest Digest #674, Volume #10   Fri, 3 Dec 99 14:13:02 EST

Contents:
  Re: Why Aren't Virtual Dice Adequate? (Johnny Bravo)
  Re: What part of 'You need the key to know' don't you people get? (wtshaw)
  Re: The $10,000.00 contesta (wtshaw)
  Re: Encrypting short blocks (wtshaw)
  Re: Quantum Computers and PGP et al. (Medical Electronics Lab)
  cookies (E-mail)
  Re: Is there an analog of Shor's algorithm for elliptic functions? (Medical 
Electronics Lab)
  Re: What part of 'You need the key to know' don't you people get? (Johnny Bravo)
  Re: cookies ("karl malbrain")
  Re: What part of 'You need the key to know' don't you people get? ("karl malbrain")
  Re: cookies (Steve K)
  Re: Peekboo Ideas? >> Oops, problem ... ([EMAIL PROTECTED])
  Re: cookies (E-mail)
  Re: Peekboo Ideas? >> Oops, problem ... 2nd ([EMAIL PROTECTED])



From: [EMAIL PROTECTED] (Johnny Bravo)
Crossposted-To: sci.math
Subject: Re: Why Aren't Virtual Dice Adequate?
Date: Fri, 03 Dec 1999 12:52:04 GMT

On Fri, 3 Dec 1999 15:17:47 GMT, Tim Tyler <[EMAIL PROTECTED]> wrote:

>What if the coins are all heads-biased (quite likely with real coins),
>and the dice are all 1-biased (quite possible if the spots are
>drilled indentations)?

  One should assume this type of bias from such a mechanical process,
but it is simple to remove the bias from them.  For example, you are
using a coin that comes up heads 90% of the time and tails the other
10%.  Pair your tosses, throw out any pair that matches.  This will
remove the bias from your results.

  With the above biased coin:
TT will show up 1 in 100: Discarded
HH will show up 81 times in 100: Discarded
HT will show up 9 times in 100: Kept
TH will show up 9 times in 100: Kept

  Giving you a 50/50 distribution of heads and tails.  The less
extreme the bias, the closer you get to keeping 50% of your generated
bits.  But even an extremely biased source can be used with this
method, if you are willing to accept the slowdowns involved in
distilling unbiased results from the data.  This is where computers
come in, if you can use a computer to generate 1000 biased bits a
second and you only kept 1/10 of them it would not be that bad, you
could generate more than 8 million bits in a day.  

>Your "complications" may dilute the biases - but don't remove them.
>
>I would treat any proposed one-time-pad which used dice or coins
>as the basis of its random number generator with some caution - if
>I wanted to leak as little information as possible.

  It isn't that hard to generate unbiased coin tosses for example, the
trouble comes from generating them at a rate fast enough to be
practical.  With coins you would have to make at least 16 tosses per
byte of data.  Flipping enough coins to transfer a megabyte is going
to take a while.

  Best Wishes,
Johnny Bravo


--

From: [EMAIL PROTECTED] (wtshaw)
Subject: Re: What part of 'You need the key to know' don't you people get?
Date: Fri, 03 Dec 1999 12:03:25 -0600

In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED] (Johnny
Bravo) wrote:
..
> 
>   If they have a claim and offer evidence to support this claim, then
> we can define the claim as worth more study.

Surely so.

>   Making a claim and offering no proof other than the assertion "I'm
> right, and you are wrong." is not worth further study.  This is
> because even if you prove that one claim wrong, they will just throw
> out more claims.

Proof in a scientific sense, I suppose.  I consider certain things David
Scott says are true by definition.  Others, I'm not sure, but keep an open
mind for now. 

> It is easier to make claims that to support or
> disprove them, why should the community be tasked with debunking every
> crackpot theory that anyone could ever come up with.

What if is an important strategy to test your position.  Science requires
routine reevaluation of positions, not being prejudiced that any taken are
always to be correct; this works on old ideas as well as new.

> If you want
> people to consider your claims, you need evidence that your claim is
> valid.

Yes, but many in science hold a few hypotheses most dearly, but have no
positive or final proof that they are true; cryptography is full of such
things.
> 
> >The last thing I am going to do is reject
> >claims if there is reason to believe that they might be true. 
> 
>   Really?  I claim you are a murderer.  Given that the other people on
> this group don't personally know either of us (and have no idea if I
> know you personally or not), there is a reason to believe that it
> might be true.  So now you should prove to the group that you are NOT
> a murd

Cryptography-Digest Digest #674

1999-06-07 Thread Digestifier

Cryptography-Digest Digest #674, Volume #9Mon, 7 Jun 99 15:13:03 EDT

Contents:
  Re: Challenge to SCOTT19U.ZIP_GUY ([EMAIL PROTECTED])
  Re: Challenge to SCOTT19U.ZIP_GUY ([EMAIL PROTECTED])
  Re: Challenge to SCOTT19U.ZIP_GUY ([EMAIL PROTECTED])
  BUG in scottNu.zip (SCOTT19U.ZIP_GUY)
  Re: Challenge to SCOTT19U.ZIP_GUY ([EMAIL PROTECTED])
  Re: Cryptography CENSORED on web site? (John Savard)
  Re: LSX Encoder ? ([EMAIL PROTECTED])
  Re: Simple Cipher (which is quite gross) ([EMAIL PROTECTED])
  Re: Challenge to SCOTT19U.ZIP_GUY (SCOTT19U.ZIP_GUY)
  Re: New Computer & Printer for Dave Scott ("Tim Cannell")
  Re: Challenge to SCOTT19U.ZIP_GUY ([EMAIL PROTECTED])
  any cryptosystems using variable length keys? (David Ross)
  Re: CRC32 (Paul Koning)
  Re: evolving round keys (Paul Koning)



Date: Sun, 06 Jun 1999 23:43:35 -0400
From: [EMAIL PROTECTED]
Subject: Re: Challenge to SCOTT19U.ZIP_GUY

SCOTT19U.ZIP_GUY wrote:
> 
>   You write good and seem practical. I think you may have worked years
> with other peoples code like I have.
> 

David,

If I can be of any help to you it would be a very simple suggestion that
would solve the criticisms you have been getting about the readability
(readability != goodness) of your source code.

The best possible thing you can to do buy a copy of "The Practice of
Programming" by Brian W. Kernigan and Rob Pike, (c) 1999
Addison-Wesley.  The MSRP is 24.95.  It is aimed at practical
programming not theoretical programming.  

When you have the book read only Chapter One.  Ignore the rest of the
book.  Chapter One is more important than the rest of the chapters put
together.

How do I know this is important?  I am unable to describe it in a way
that is easy for others to understand (like your program), but I *KNOW*
from personal and impersonal experience, that it is the most important
thing you can learn about software engineering.  It helps you think
better.  You'll understand when you see the subtitle of the book.

Good luck.

--

Date: Sun, 06 Jun 1999 23:58:04 -0400
From: [EMAIL PROTECTED]
Subject: Re: Challenge to SCOTT19U.ZIP_GUY

SCOTT19U.ZIP_GUY wrote:
> 
> In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED] wrote:
> >On Fri, 04 Jun 1999 20:24:05 GMT, [EMAIL PROTECTED] (SCOTT19U.ZIP_GUY)
> >wrote:
> >
> >>  I have worked on many aircraft simulations and OFP;s one of the main
> >>problems that seems to occur over and over is that other people keep
> >>missing the obvious errors in the code becasue most people inheirently
> >>put faith on the comments and this leads to major maistakes that take
> >>years to find and fix. But I was considered an expert in fixing such code.
> >>LIke I said it is usually easier once one has input and outputs to just
> >>shorten internal names and fix the code.  I have even been tasked with adding
> >>routines for certain projects that I have written and some managers where
> >
> >>Yes I am bragging so what.
> >
> >Scott,
> >
> >You find short names easy.
> >Others find long names easy.
> >
> >You find reading your own code easy, but have you tried reading OTHER
> >people's code? Was it as easy?
> >
> 
>   Yes once you toss out the usless comments. However have worked on
> projects that where into very flowery comments and the group was proud
> there comments failed to discribe the inputs or units. Yet these people
> thought thye were commenting something.

No, they thought they were following the rules.  Blindly.  You cannot
communicate by following syntax rules.  Communication requires
semantics.

So don't add syntactic comments.  Add semantic comments.  Tell people
WHY you do thinkgs certain ways, not HOW or WHAT you do.  The code
answers WHAT and HOW, but it is silent about WHY.

This is not a forum for discussing coding style.  It is a forum for
discussing ciphers.  Your coding style interferes with the discussion of
your cipher. Everyone wants to know WHY you wrote what you did.

Answer them.

--

Date: Mon, 07 Jun 1999 00:00:58 -0400
From: [EMAIL PROTECTED]
Subject: Re: Challenge to SCOTT19U.ZIP_GUY

SCOTT19U.ZIP_GUY wrote:
> 
> In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED] wrote:
> >Try making one person barely satisfied.  Until you have done that you
> >risk being accused of bad faith.  I.e., you aren't really trying.
> >
>   I did that with Horst Ossifrage and actually did it with Mok but I think he
> was faking interest. Actually I am anwsering Redburn questions and if Paul
> Onions has any or Joe P.

OK, keep trying.

--

From: [EMAIL PROTECTED] (SCOTT19U.ZIP_GUY)
Subjec