secure (proactive?) clock synchronization

1999-07-19 Thread amir . herzberg
We've been recently working on what seems like a neat new clock synchronization protocol, which will hopefully offer proactive security (recovery from penetrations, see http://www.hrl.il.ibm.com/proactive). Surprisingly, it also appears a very practical protocol. It has been some time since I

RE: depleting the random number generator

1999-07-19 Thread Enzo Michelangeli
Sorry folks, but I can't understand where the problem is supposed to be. The entropy of a pool is a measure of the information about its internal state that we don't know: which is why in thermodynamics the same name is given to the logarithm of the number of (invisible) microstates

Re: depleting the random number generator

1999-07-19 Thread Eric Murray
On Sun, Jul 18, 1999 at 06:09:15PM -0400, Donald E. Eastlake 3rd wrote: RFC 1750 recommends the Blum Blum Shub generator. Which is pretty slow- on the order of an RSA public key operation. A hardware RNG would be the best solution. It won't help the original poster now, but I think that

Re: depleting the random number generator

1999-07-19 Thread Ben Laurie
David Honig wrote: Ben suggests using "hashcash" to prevent malicious depletion of the entropy pool, where the "hashcash" (hashes that are expensive to compute but cheap to verify) becomes the limiting resource instead of the server's MIPS. This prevents DoS attacks but doesn't solve

Re: depleting the random number generator

1999-07-19 Thread Ben Laurie
bram wrote: On Mon, 19 Jul 1999, Enzo Michelangeli wrote: Sorry folks, but I can't understand where the problem is supposed to be. The entropy of a pool is a measure of the information about its internal state that we don't know: which is why in thermodynamics the same name is given to

Re: depleting the random number generator

1999-07-19 Thread Sandy Harris
Enzo Michelangeli wrote: Sorry folks, but I can't understand where the problem is supposed to be. The entropy of a pool is a measure of the information about its internal state that we don't know: which is why in thermodynamics the same name is given to the logarithm of the number of

Re: depleting the random number generator

1999-07-19 Thread bram
On Mon, 19 Jul 1999, Ben Laurie wrote: The brief summary of the above is that it's possible to simply replace /dev/random with something which doesn't deplete entropy and the problem will go away. And yes, it is possible to do that in a secure manner. So what you are saying is that

PGP encryption

1999-07-19 Thread Hans Viens
Hi Folks, When implementing PGP base encryption, is this implementation MUST use symetrically Algorithms ?? Is it possible to use only the public/private key ? I would like more explanation about that! :o) Best regards, Hans...

DCSB: Ari Juels; Outsourcing MicroMint Coins, and X-Cash for Contingent Financial Instruments

1999-07-19 Thread Robert Hettinga
--- begin forwarded text Date: Mon, 19 Jul 1999 10:51:32 -0400 To: [EMAIL PROTECTED], [EMAIL PROTECTED] From: Robert Hettinga [EMAIL PROTECTED] Subject: DCSB: Ari Juels; Outsourcing MicroMint Coins, and X-Cash for Contingent Financial Instruments Cc: Ari Juels [EMAIL PROTECTED] Sender:

Re: depleting the random number generator

1999-07-19 Thread Marc Horowitz
Sandy Harris [EMAIL PROTECTED] writes: /dev/random uses SHA or MD5, so a complete break appears highly unlikely. But a special-case break, say in circumstances where the input entropy is temporarily exhausted so the attacker gets a look at N successive results where the pool does not change,

Re: depleting the random number generator

1999-07-19 Thread David Honig
Bram, the *nix /dev/random code *does* accumulate a pool of 'physical' (interrupt, interrupt timing) entropy and stirs and extracts bits via a crypto secure hash (e.g., MD5 in FreeBSD). And you can easily expand this pool by modifying the code. But the pool is always finite; therefore

RE: depleting the random number generator

1999-07-19 Thread David Honig
At 03:46 AM 7/19/99 -0400, Enzo Michelangeli wrote: Sorry folks, but I can't understand where the problem is supposed to be. The entropy of a pool is a measure of the information about its internal state that we don't know: which is why in thermodynamics the same name is given to the logarithm