Re: Finding encrytion algorithm

2002-07-13 Thread gfgs pedo

hi,

thanx Mr Jim.

Data.


__
Do You Yahoo!?
Yahoo! Autos - Get free new car price quotes
http://autos.yahoo.com




Fakes... (fwd)

2002-07-13 Thread Jim Choate



-- Forwarded message --
Date: Sat, 13 Jul 2002 20:14:28 -0700 (PDT)
From: Dardani Boletus <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Fakes...


There is something extremely wrong with every single
person in this world. They seem to be part of a
pointless simulation.
 
"The Matrix" has portrayed this idea somewhat, yet we
watch it and go back to our daily lives.  Yet in this
very life, underneath the seeming diversity in
people's opinions, values, talents, and interests,
there is something that makes everyone the same.  It
is as though this planet is populated only by mindless
fakes, objects that provide the appearance of
intellect on the surface but are based on only
mechanical reflexes and primitive thought patterns.
 
I don't really care if anything I say has been said
before, if it was portrayed in movies, in books, or in
the lyrics of some useless song. With 6 billion people
covering the globe at any given time, thousands and
thousands of years of written literature, probability
dictates almost any combination of words has occurred
numerous times. Yet there is clear evidence there was
no action, so those words, just like the people who
spoke them, must have been just more fakes. I am
forced to use this language (also created by the
fakes) because there is no alternative, so everything
I write here could be misunderstood to make me sound
like one of them, but it will be the action that I
take and the dedication that will separate me from
them.
 
In my estimation the fakes that occupy this planet
don't make up 99%, but more like 99.999% of the
population. I know this because I've searched, and in
my search have so far only found one true ally (I have
found him via the internet as well). But even with
those numbers we would not give up because there is no
logic in giving up. 
 
The people on this planet are all fakes because the
societies have made them this way. Ideas that populate
people's minds have no logic or purpose. Concepts such
as religion, god, morality, individualism, freedom,
identity, happiness, love and billions of others are
all just memes. Like parasites they infect the minds
and spread from one person to the next. They have no
point or purpose; they exist without any logical basis
or foundation. The fakes are completely controlled by
them, and they will never see beyond them. To not be
controlled by them one must do more then just realize
that they exist. One must resist any ideas that have
no point, endlessly question, and never accept
imperfection or compromise in any answer.
 
We (myself and my ally) are different though. While we
have had the limitation of existing only in these
societies, something has made it possible for us to
resist being indoctrinated into becoming one of those
fakes. We have no arbitrary wants, needs, desires, or
preferences. 
 
If this world continues to exist the way it is then
nothing in it will ever have a point. It will always
be just a product of random evolution, one with no
importance or relevance. The only logical goal is to
dedicate our lives to increasing our numbers, those
that aren't fakes, so that in thousands of years our
numbers may be such that the fakes would no longer be
a threat to progress.
 
Those that join us must see every other person
occupying this planet as the enemy, and us as their
only allies. Like us they must have dedication only to
taking the most logical action, and to nothing else.

To tell you more about us, we've posted some personal
information about ourselves on a website. You'll also
find past responses to us on that webpage.  

Obviously anyone reading this email is most likely
just another fake. Do not simply reply to this email,
if you do your message will almost certainly be
ignored. If you do wish to communicate, first
demonstrate your interest by taking the effort to
find us online, one of the ways to do that is
described below.

Use a major search engine to search for every
combination of any two words from the list below.
The order of the words shouldn't matter as long as
you do not search for them in quotes, but generally
it should be clear what words can go together and
in what order. Also when you pick the right 
combination you shouldn't need to look at more 
then the first matches.

There are actually at least 7 (or more) different 
combinations and websites you can find by searching 
this list. The one you should contact will clearly
say it is the 'communication' page and will have
three forms to fill out. Mention what sites you did
find, the more effort it seems you took the more
likely we would believe in your dedication.

There is no trick to this and this isn't meant to be
quick, it should, however, be fairly clear if/when you
find the right site. The following search engines were
verified by us, please use any of them as other search
engines may simply not list us correctly: Yahoo, 
Google, InfoSeek, Lycos, MSN, LookSmart, HotBot,
InfoSpace, Ask.com, AllTheWeb, Teoma, WebCr

economics of DRM, was Re: Ross's TCPA paper

2002-07-13 Thread Eric Murray

On Sat, Jul 13, 2002 at 06:34:36PM +1200, Peter Gutmann wrote:
> Eric Murray <[EMAIL PROTECTED]> writes:
> >On Fri, Jul 12, 2002 at 07:14:55PM +1200, Peter Gutmann wrote:
> >>From a purely economic perspectice, I can't see how this will fly.  I'll pull a
> >>random figure of $5 out of thin air (well, I saw it mentioned somewhere but
> >>can't remember the source) as the additional manufacturing cost for the TCPA
> >>hardware components.  Motherboard manufacturers go through redesigns in order
> >>to save cents in manufacturing costs, and they're expected to add $5 to their
> >>manufacturing cost just to help Microsoft manage its piracy problem?
> >
> >Motherboard makers don't pay for it.  Microsoft pays for it.
> 
> Hmm, I can just see it now, Windows 2005 ships as three CDs, a 400-page EULA, a
> fine-tip soldering iron, a magnifying glass, an EMBASSY chip, and a copy of
> "SMD Soldering for Dummies".


You're probably joking, but just in case you're not, or there's
somone who doesn't get it, here's how it works:


Wave (or someone like them) makes a deal with the motherboard
makers to install EMBASSY chips.  Wave pays the motherboard makers
to do it, so there is no added cost to them.  Wave then sells the rights
to use the EMBASSY to Microsoft, Sony, et. al.   The arrangement
may involve percentages of the fees that users pay (i.e. Wave
gets 50% of $1 that a user pays for a Sony-owned song, and gives half
of that to the motherboard maker), or it might involve up-front
payments.  It can work either way.

The difficulty is to get enough EMBASSY or whatever chips out there to
make a critical mass that's attractive to use, and to distribute the
cost of the DRM hardware and software over enough DRM customers that
it's profitable for each one.  i.e. MS might not want to underwrite $20
worth of DRM by itself, because it doesn't make enough more through
DRM-enforced licensing to make a profit from it.  But if the $20 for
the DRM is split among 20 companies, each paying $1, they can all make
a profit from using it.  TCPA, by standardizing the DRM, makes it easier
to get a critical mass and easier to round up participants.

I think that it is important to understand the economics behind DRM
because that is ultimately what will determine if and how it is deployed.
Microsoft does not do things simply because they enjoy being evil.
They are not so worried about Linux (with its small share of the market)
that they will spend mega-bucks now on a very long term project that might
possibly let them keep it off some PCs in the far future.  They _are_
concerned with getting paid for the 50% of their software that isn't
paid for.  There's a shitload of money there, and if getting at some of
it costs a little, well, its still more profit than they would
have gotten otherwise.

Of course its even better for them if they can convince users that DRM
is an added security feature, or they can get governments to require it
(i.e. V-chip).  Then the users pay for it.  But I don't see either of
those being very likely.  It's more probable that there needs to be
significant profit in it for a number of players to make it go.


Eric




Re: Finding encrytion algorithm

2002-07-13 Thread Jim Choate


A RNG is a character or string generator whose generation algorithm
prevents prediction of the next output if one knows all the previous
outputs and the algorithm. In other words if you know everything there is
to know about the generator your odds of predicting the next output state
are even - pure luck - 'Fair'.

A PRNG is one that fails the RNG test.

Read Knuth, you should also check out,

Exploring Randomness
G.J. Chaitin
ISBN 1-85233-417-7

Has some interesting insite on randomness, some of his propositions are
not exactly same old same old. Interesting read.


On Sat, 13 Jul 2002, gfgs pedo wrote:

> hi,
> 
> eer..I think we need a defenition of an Rng & Prng
> that every 1 should agree on.
> 
> would this help?
> 
> RNG & PRNG
> 
> 
> 1:>A RNG has an infinite period where as a PRNG has a
> defenite period after which the sequence will repeat.
> Atmospheric noise,Radiation decay are examples of
> RNG's.(Difference)
> 
> 2:>An RNG & PRNG should pass a series of radomness
> tests. (Similarity)
> 
> 3:>For the same set of input parameters,a RNG always
> give a different output.
> A PRNG always gives the same set of outputs for the
> same input parameters (Difference) 
> 
> 
> would any 1 also like 2 review
> 
> http://www.ircsuper.net/~neo/prng.html
> thanx.
> 
> Regards Data.


 --


  When I die, I would like to be born again as me.

Hugh Hefner
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






Re: Finding encrytion algorithm

2002-07-13 Thread gfgs pedo

hi,

thanx for the replies.
one doubt escpecially on this.
>
>But every algorithm has some 
>statistical
>signature and if you've got enough cipher text you
>can compare that
>signature with known algorithms to home in on fewer
>choices.

can u pls explain how they have statistical
signatures,pls-


 may be using SPN's, i have tried ANSI X9.17 key
generation with GOST-it did have a negligably small
skew-it makes me wonder what statistical signature
they have.The negligable skew is a weakness but not
high enough to compramise the security of the key used
from the ANSI x9.17 key gen method.
pls explain.
thank u veru much.

Regards Data.




--- Mike Rosing <[EMAIL PROTECTED]> wrote:
> On Thu, 11 Jul 2002, gfgs pedo wrote:
> 
> > suppose a cryptanalysis only has encrypted
> data-how is
> > going 2 know which is the encrytion algorithm used
> 2
> > encrypt the data ,so that he can effeciently
> > cryptanalyse if
> >
> > 1:>he has large amount of cipher text only
> > 2:>has large amount of plain text and
> corresponding
> > cipher text.
> >
> > There r so many encryption algorithms,how does he
> know
> > which algorithm was used?
> 
> Depends on how they got the source.  They may know
> it's one of 5
> possible choices because of the person who sent (or
> received) it.
> If it's just found on a disk in a garbage dump with
> no connections
> to anyone, it's a bit tougher.  But every algorithm
> has some statistical
> signature and if you've got enough cipher text you
> can compare that
> signature with known algorithms to home in on fewer
> choices.
> 
> I'm not sure having the plaintext helps much more,
> but you could
> use random keys to create several ciphertexts with
> known algorithms and
> compare the statistics just to see if they compare
> better.
> 
> It's definitly challenging :-)
> 
> Patience, persistence, truth,
> Dr. mike
> 
> 


__
Do You Yahoo!?
Yahoo! Autos - Get free new car price quotes
http://autos.yahoo.com




Re: Ross's TCPA paper

2002-07-13 Thread Peter Gutmann

Eric Murray <[EMAIL PROTECTED]> writes:
>On Fri, Jul 12, 2002 at 07:14:55PM +1200, Peter Gutmann wrote:
>>From a purely economic perspectice, I can't see how this will fly.  I'll pull a
>>random figure of $5 out of thin air (well, I saw it mentioned somewhere but
>>can't remember the source) as the additional manufacturing cost for the TCPA
>>hardware components.  Motherboard manufacturers go through redesigns in order
>>to save cents in manufacturing costs, and they're expected to add $5 to their
>>manufacturing cost just to help Microsoft manage its piracy problem?
>
>Motherboard makers don't pay for it.  Microsoft pays for it.

Hmm, I can just see it now, Windows 2005 ships as three CDs, a 400-page EULA, a
fine-tip soldering iron, a magnifying glass, an EMBASSY chip, and a copy of
"SMD Soldering for Dummies".

Peter.




RE: DNA databases to be classified

2002-07-13 Thread Peter Gutmann

"Lucky Green" <[EMAIL PROTECTED]> quoted:

>The feat proves that even if all the polio virus in the world were
>destroyed, it would be easily possible to resurrect the crippling
>disease. It also raises the worrying possibility that bioterrorists
>could use a similar approach to create devastating diseases such as
>ebola and smallpox without having to gain access to protected viral
>stocks.

I saw this on BBC news.  It took a very sophisticated lab two years work to
produce polio.  They thought they might be able to do smallpox given about 20
years work.  They even managed to slip in an Internet reference in the story. 

I guess "We synthesised polio from RNA" just isn't newsworthy enough on its
own.

Peter.




Re: economics of DRM, was Re: Ross's TCPA paper

2002-07-13 Thread Harmon Seaver

On Sat, Jul 13, 2002 at 10:59:23AM -0700, Eric Murray wrote:
> Microsoft does not do things simply because they enjoy being evil.
> They are not so worried about Linux (with its small share of the market)
> that they will spend mega-bucks now on a very long term project that might
> possibly let them keep it off some PCs in the far future.  They _are_
> concerned with getting paid for the 50% of their software that isn't
> paid for.  There's a shitload of money there, and if getting at some of
> it costs a little, well, its still more profit than they would
> have gotten otherwise.

   Isn't it much simpler for them to just write into their OS the ability to
snitch on what M$ software was on the users machine everytime they go online? In
fact, I've been assuming that everything from w98 on did exactly that. And
wouldn't it be trivial for them to check for cracked serial numbers, or
duplicate serial numbers? 

-- 
Harmon Seaver   
CyberShamanix
http://www.cybershamanix.com




Re: Finding encrytion algorithm

2002-07-13 Thread Mike Rosing

On Sat, 13 Jul 2002, gfgs pedo wrote:

> can u pls explain how they have statistical
> signatures,pls-
>
>
>  may be using SPN's, i have tried ANSI X9.17 key
> generation with GOST-it did have a negligably small
> skew-it makes me wonder what statistical signature
> they have.The negligable skew is a weakness but not
> high enough to compramise the security of the key used
> from the ANSI x9.17 key gen method.
> pls explain.
> thank u veru much.
>

You're on the right track.  Take several encryption algorithms
of your choice, then use a fixed IV, and the same sets of keys,
and encrypt blocks of 0's.  For each algorithm, compute several sets of
staticstics (a la NIST or DIEHARD).  With 100 blocks of 10 Megabytes
(100 different keys) you should see some interesting differences.

Remember, your question originally was "how can you tell which algorithm",
not "how do you find the key".  Let us know what you find out :-)

Patience, persistence, truth,
Dr. mike





Re: Finding encrytion algorithm

2002-07-13 Thread Jim Choate


Perhaps a simpler example. Let's look at a 'fair' coin and what that means
in the real world.

A normal coin (or any nDx for that matter [1]) for short sequences is
random. In other words if you record a game sequence and then replay the
game the die sequence won't have any statistical correlation. Knowing what
happened last time won't help you this time, the 'window of opportunity'
with respect to statistical bias isn't large enough, so the game is
'fair'.

But!, if you throw that coin once a second for a billion years you will
find that -no- coin is really -fair-. This goes back to k-sequences and
Knuth. Go back and then start throwing it again, and if your sequence is
long enough you can use this known bias from the first experiment to
increase your percentage of 'hits' in the second sequence. In other words
you can now prove experimentaly the coin isn't fair and what that bias is.

This is related to 'Hypothesis Testing'. It's rather strange, but I happen
to be rereading a book, "The Mathematical Sciences: A Collection of
Essays" (LoC# 69-12750) put out by some group called COSRIMS in about
1969. I remember the book because somebody gave it to me (I was about 9 or
10 at the time) to read, and it has an insane bright yellow cover. I
recently came across it again in a used bookstore for $10 so I bought it.
It's basically a bunch of chapters on various issues of math research with
the intent of focusing high school and undergrads to pursue mathematical
careers by giving examples of what you might be working on. The chapter
"Statistical Inference" (by J. Kiefer) uses an example of a coin and a
3-run sequence to determine the actual bias of the coin (the example is
very simple, the coin is very biased). You should be able to still find
the book in public libraries and college libraries. I'm sure more modern
texts on hypothesis testing will be just as relevant.

The vast majority of RNG's that we use are really PRNG's, we just don't
collect enough data on them to be able to demonstrate that. Or the
sequence of interest is so short we dont' care.

[1] A coin is a 1D2, two coins would be 2D2, for example. Who said
wargaming was worthless ;)


On Sat, 13 Jul 2002, Mike Rosing wrote:

> On Sat, 13 Jul 2002, gfgs pedo wrote:
> 
> > can u pls explain how they have statistical
> > signatures,pls-
> >
> >
> >  may be using SPN's, i have tried ANSI X9.17 key
> > generation with GOST-it did have a negligably small
> > skew-it makes me wonder what statistical signature
> > they have.The negligable skew is a weakness but not
> > high enough to compramise the security of the key used
> > from the ANSI x9.17 key gen method.
> > pls explain.
> > thank u veru much.
> >
> 
> You're on the right track.  Take several encryption algorithms
> of your choice, then use a fixed IV, and the same sets of keys,
> and encrypt blocks of 0's.  For each algorithm, compute several sets of
> staticstics (a la NIST or DIEHARD).  With 100 blocks of 10 Megabytes
> (100 different keys) you should see some interesting differences.
> 
> Remember, your question originally was "how can you tell which algorithm",
> not "how do you find the key".  Let us know what you find out :-)
> 
> Patience, persistence, truth,
> Dr. mike
> 
> 


 --


  When I die, I would like to be born again as me.

Hugh Hefner
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org