Re: stego fingerprints

2001-02-20 Thread Russell Nelson
David Honig writes: Similarly, stego'ing an .mp3 ripped from a CD is a bad idea; stego'ing a .mp3 you made from a signal that was analogue at some point works. Every algorithm is deterministic, but different algorithms will produce different results. And there is no "standard" algorithm

Re: Is PGP broken?

2000-12-03 Thread Russell Nelson
Bram Cohen writes: Not that I'm going to propose a new standard or even modifications to old ones - there are already too many of those, the problem is making one of them acceptable, or develpoing a new one which has a good chance of getting universal support. Have you looked at

Re: Is PGP broken?

2000-12-02 Thread Russell Nelson
Stefan Kelm writes: BTW, what do you mean by "point-source PGP signing"? Instead of leaving your key signing up to your friends, PGP could benefit from a policy-based signature. You could come up with any number of policies: o This keyholder is a Mason/Scout/Rotarian. o This keyholder is

Is PGP broken?

2000-11-28 Thread Russell Nelson
Is it just me, or is PGP broken? I don't mean any particular version of PGP -- I mean the fact that there are multiple versions of PGP which generate incompatible cryptography. Half the time when someone sends me a PGP-encrypted message, I can't decrypt it. Presuming that I'm right, is anyone

The best

2000-09-12 Thread Russell Nelson
If the best is the enemy of the good, is strong crypto the enemy of all other crypto? Just something to ponder... -- -russ nelson [EMAIL PROTECTED] http://russnelson.com | Crynwr sells support for free software | PGPok | Damn the firewalls! 521 Pleasant Valley Rd. | +1 315 268 1925 voice |

Re: DeCSS and imminent harm ...

2000-09-01 Thread Russell Nelson
James A. Donald writes: It is a test of will and power. Kaplan took offense at the widespread attitude that such an act was beyond the power of a judge, that judges not only should not censor thei internet, but that they *could* not censor the internet, that the internet was stronger

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-01 Thread Russell Nelson
Ed Gerck writes: Even though the web-of-trust seems to be a pretty good part of PGP, IMO it is actually it's Achilles heel. Nope. Usability is its Achilles heel. PGP needs to be wrapped in something, and yet it's not really designed to be wrapped. Even if it were, PGP, Inc. changed the

Re: Comcast@Home bans VPNs

2000-08-19 Thread Russell Nelson
Ian Brown writes: ... subscribers to agree not to use the service as a means to create a VPN. Could someone describe to me (in my ignorance) the problem this rule is intended to solve? -- -russ nelson [EMAIL PROTECTED] http://russnelson.com | If you think Crynwr sells support for free

Re: Electronic Signatures Yield Unpleasant Surprises

2000-06-28 Thread Russell Nelson
Don Davis writes: if we are successful in making crypto that's usable enough to become pervasive, then industry and the public will need new laws to help resolve social conflicts involving crypto, such as inevitably will arise. I'm not sure this statement is as obvious as you think it

Re: KeyGhost

2000-06-22 Thread Russell Nelson
Lyle Seaman writes: What I really want is a keyboard with a slight variation -- not a KeyGhost but a KeySpook. If you have no physical security, you have no computer security. I can't think of any qualifiers to add to that statement. -- -russ nelson [EMAIL PROTECTED]

good cellphone hacking press

2000-05-25 Thread Russell Nelson
The May 1 issue of America's Network (http://www.americasnetwork.com) has some nice press for cryptography in its Wireless column. The title is "Hacked again!" and the subtitle is "Another cellular algorithm has bitten the dust at the hands of cryptographers armed with little more than a PC.

Re: Critics blast Windows 2000's quiet use of DES instead of 3DES

2000-05-18 Thread Russell Nelson
L. Sassaman writes: PGP's source code has always been available for public review. This has not changed. There are no "back doors" for the NSA in PGP, paranoiaUnless they are particularly subtle ones, based on a mathematical understanding that is not yet publicly known. Remember that the

Re: hiding plaintext

2000-03-03 Thread Russell Nelson
Bill Stewart writes: At 02:54 PM 03/01/2000 -0500, Russell Nelson wrote: The essence of the above algorithm (let's call it BP1, for Buried Plaintext 1) is to force the decryption trial to be iterated until the buried plaintext is found. It means that the decryption engine needs to have

hiding plaintext

2000-03-01 Thread Russell Nelson
One could increase the difficulty of decryption by three or four doublings by intermixing random data with plaintext in a message. Here's the least stupid method I can think of: the first character in a message is the start of text (SOT) character. The second character in a message is the end of

Re: hiding plaintext

2000-03-01 Thread Russell Nelson
Eric Murray writes: On Tue, Feb 29, 2000 at 11:14:31AM -0500, Russell Nelson wrote: One could increase the difficulty of decryption by three or four doublings by intermixing random data with plaintext in a message. Here's the least stupid method I can think of: the first character

Re: ZKS hires Brands, licenses patents

2000-02-23 Thread Russell Nelson
lcs Mixmaster Remailer writes: Have their been other open source projects which used patented technology owned by the company releasing the source? How has the licensing been handled in those cases? Basically, "You get a license for this patented algorithm only if you use this source

Coerced decryption?

2000-02-11 Thread Russell Nelson
Caspar Bowden writes: And, as a result, the Bill proposes that the police or the security services should have the power to force someone to hand over decryption keys or the plain text of specified materials, such as e-mails, and jail those who refuse. Nobody's mentioned the possibility

Re: The problem with Steganography

2000-01-27 Thread Russell Nelson
Ben Laurie writes: If you want a lot of people to see it, you can't keep it secret. If you can't keep it secret, you may as well just come out with it and publish the bits without stego. What did I miss? It depends on how hostile the regime is. If you want to publish something but

A big safe source of random (colored) bits

2000-01-27 Thread Russell Nelson
Okay, here's something I've been thinking of for a while. Run a political discussion mailing list which mails audio files back and forth. This list, at least in the US, would enjoy the highest Constitutional protection. However, you'd never know if the low bits of the audio stream have been

Re: The problem with Steganography

2000-01-26 Thread Russell Nelson
David Honig writes: At 03:20 PM 1/25/00 -0500, Russell Nelson wrote: I'm trying to do forward stego -- that is, publish some encrypted steganographic document, with the idea that, once everyone has a copy, *then* you reveal the key. Fascinating, captain. Canna imagine why

Re: The problem with Steganography

2000-01-25 Thread Russell Nelson
lcs Mixmaster Remailer writes: The problem with Steganography is that there's basically no way to clue people in to it's location without clueing everyone into it. Encryption is successful if the attacker can't find information about the plaintext without the key. Ideally, he can't

Re: Export control of Java VM ??

1999-12-02 Thread Russell Nelson
Ron Rivest writes: (*) A Post tag system has a number of rewrite rules of the form L_i -- R_i where L_i and R_i are strings over some alphabet (e.g. binary). As long as the prefix of the input matches some L_i, that L_i is removed from the beginning of the input, and

RE: Two Observations on the IETF Plenary Wiretap Vote

1999-11-15 Thread Russell Nelson
lcs Mixmaster Remailer writes: Lucky Green [EMAIL PROTECTED] writes: Over the years, using Wei Dai's term Pipenet (or Pipe-net, as it was spelled originally) has firmly been established as denotating an anonymous IP network that uses constant or otherwise data independent "pipes"

Re: PGPphone sources released.

1999-11-13 Thread Russell Nelson
Ted Lemon writes: Apparently the sources to PGPphone have been released (after many years). See: According to that message, the license is not an open source license, though, so this is unfortunately not very exciting. :'( Right. However, you are free to download the source

Re: Almost-Everywhere Superiority for Quantum Computing

1999-10-17 Thread Russell Nelson
Julian Assange writes: Simon as extended by Brassard and H{\o}yer shows that there are tasks on which quantum machines are exponentially faster than each classical machine infinitely often. The present paper shows that there are tasks on which quantum machines are

Re: IP: IETF considers building wiretapping into the Internet

1999-10-13 Thread Russell Nelson
Steven M. Bellovin writes: So -- how should the back door be installed? In the protocol? In the telco endpoint? Is it ethical for security people to work on something that lowers the security of the system? Given that it's going to be done anyway, is it ethical to refrain, lest it

Re: desirable properties of secure voting

1999-10-12 Thread Russell Nelson
Anonymous writes: 8. Receipt­freeness: A voter can't prove to a coercer, how he has voted. As a result, verifiable vote buying is impossible. It appears that the votehere system does not satisfy this, since the vote is published in encrypted form, so the voter can reveal the

Re: The well-travelled packet

1999-09-25 Thread Russell Nelson
Ray Hirschfeld writes: Seriously, my first reaction was that no crime had been committed, but upon re-examining the export regulations I'm not so sure. Perhaps the fact that the packets are explicitly destined for the US is considered "adequate precaution" against unauthorized transfer.

The well-travelled packet

1999-09-24 Thread Russell Nelson
Forwarded with permission (the permission being the short quote below, the message being the long one). I don't have a copy of the traceroute, but it definitely showed packets going from Washington DC to NYC through Paris. Dick St.Peters writes: Well, the questions were really intended to be

I'm not sure we have the obvious problem here.

1999-09-18 Thread Russell Nelson
On Fri, 17 Sep 1999, Greg Broiles wrote: What scares me is the possibility that there won't even be an argument about whether or not a particular clump of ciphertext decodes to a particular bit of plaintext because I don't think it'll be possible to cross-examine prosecution witnesses

Re: Why did White House change its mind on crypto?

1999-09-17 Thread Russell Nelson
Ben Laurie writes: Declan McCullagh wrote: Another answer might lie in a little-noticed section of the legislation the White House has sent to Congress. It says that during civil cases or criminal

RSA security advert

1999-09-15 Thread Russell Nelson
The September 13th InfoWorld has an advertisement by RSA Security. If you squint your eyes up real tight, and read between the lines, it reads like this: Our patents are running out. Please don't forget who invented this stuff.

Re: Power analysis of AES candidates

1999-08-31 Thread Russell Nelson
John Kelsey writes: There's some question about how hard it will be to design hardware that will be DPA-resistant for different algorithms. Big on-chip caps. Lithium batteries. Tamper-resistant housings. That's what Dallas Semiconductor uses for its 1-Wire devices, including the famous

Re: message-signing at the MTA level

1999-08-22 Thread Russell Nelson
Greg Rose writes: At 22:09 21/08/1999 -0400, Russell Nelson wrote: I've been thinking about cryptographic signing of messages at the mail transfer agent level. I can think of how to do it, but I'm not sure what problem it solves. :) Anyone have any ideas? Signing messages

Re: Proposed bill for tax credit to develop encryption with covert access

1999-08-04 Thread Russell Nelson
-- BEGIN 2rot-13 David Jablon writes: Amazing! Despite the title, this seems to be a retro-active tax break for all developers of snake-oil and other poorly concieved or poorly implemented cryptography. Or for that matter, poorly selling. There's nothing in the bill that requires that

It's to be expected (crypto laws)

1999-07-23 Thread Russell Nelson
I just read _The Incredible Bread Machine_, by R. W. Grant. A Fox Wilkes book, available from Laissez-Faire Books. I think a quote from page 241, on The Limits of Political Action, is appropriate in re the recent "I told you so" observation by Lucky Green: Government is force, and

Re: depleting the random number generator

1999-07-18 Thread Russell Nelson
John Denker writes: The bad part is that Whitney has already gobbled up quite a few bits of entropy from /dev/random before the slightest bit of authentication is attempted. You're presuming that you're using the standard Linux version of /dev/random. You could quite easily write a driver

Eason/Kawaguchi stego

1999-06-29 Thread Russell Nelson
There's an EETimes article on Eason/Kawaguchi stego in the 6/28 issue. They hide their bits in the most complex parts of the image -- where neighboring pixels are most different from one another. Also, only a few parameters are needed to retrieve the information, so anybody with the appropriate

Re: Eason/Kawaguchi stego

1999-06-29 Thread Russell Nelson
Jay Holovacs writes: -- From: Russell Nelson [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Eason/Kawaguchi stego Date: Tuesday, June 29, 1999 9:27 AM . Also, only a few parameters are needed to retrieve the information, so anybody with the appropriate

Re: NPR story on crypto...

1999-06-28 Thread Russell Nelson
John Young writes: What's intriguing is whether PECSENC, now headed by an ex-NSA honcho, is going to bite NSA's sigint bullet, and recommend that strong encryption is better for the public interest than natsec snooping, what with the world now getting its hands on means of strong

Re: Word needed for Entropy

1999-06-28 Thread Russell Nelson
[I suspect we're hitting the end of this thread... --Perry] At 9:32 AM -0700 6/26/99, Carl Ellison wrote: I've been guilty of sloppy use of English, occasionally, and one such sloppiness that I run into occasionally is with the word "entropy" for cryptographic purposes. What we need

Re: so why is IETF stilling adding DES to protocols? (Re: It's official... DES is History)

1999-06-26 Thread Russell Nelson
Lucky Green writes: OpenSSL is a library. It should support whatever the standard supports and whatever users and/or authors of the lib desire to be in the lib. That may include broken or null-ciphers. But the user should have to take positive action to get at the broken ciphers. I

Just the ticket for those conferences

1999-04-09 Thread Russell Nelson
http://loaf.ecks.org/ Linux On A Floppy. Get networking params (IP address, subnet mask, default router), power-down, insert floppy, reboot. Comes with ssh. -- -russ nelson [EMAIL PROTECTED] http://crynwr.com/~nelson Crynwr supports Open Source(tm) Software| PGPok | There is good evidence

Re: Neal Stephenson's Cryptonomicon

1999-04-02 Thread Russell Nelson
Jeff Simmons writes: There's also a page at http://www.well.com/user/neal/cypherFAQ.html that is aimed at the cypherpunk list. Most interesting part is that evidently Bruce Schneier designed a special cypher for use in the novel, based on a deck of playing cards. (?) I'll ask the

Re: Biprime Cryptography to replace RSA?

1999-03-31 Thread Russell Nelson
Bluefish [@ home] writes: I would propose "Biprime Cryptography" or "BPC" as the generic term for RSA. Biprime is a natural and appropriate English name for the product of two primes. There are other "biprimes" too, BiPrime Factoring. BPF (no, not Berkeley Packet Filter!) --

mixmaster the DNS

1999-02-08 Thread Russell Nelson
Hmmm Anybody thought of combining mixmaster, an SMTP client, SMTP server, and the DNS? Here's how it would work: 1) email would arrive at the SMTP client using ordinary means. 2) The SMTP client would ask the DNS for the MX records for the host. 3) If the DNS has two MX records which

Re: Intel announcements at RSA '99

1999-01-27 Thread Russell Nelson
Arnold G. Reinhold writes: I do not agree, however, that 1 bit per second would be fast enough. Why not? Randomness never goes stale. If it did, they wouldn't print books full of random numbers. Store the 1bps in a FIFO. Save that entropy! There's a limited amount of it in the universe,

RE: France Allows 128 Bit Crypto

1999-01-20 Thread Russell Nelson
Black Unicorn writes: WOAH. Are you sure you know what you are doing? You're close to imposing a duty to decrypt punishable by penal sanctions (read jailtime). This is precisely the WRONG way to go. Sure, because you can't tell the difference between someone who is unable to decrypt

Re: crypto-stego

1999-01-05 Thread Russell Nelson
Bill Stewart writes: At 09:42 PM 12/30/98 -, Russell Nelson wrote: Now here's a silly question: cryptanalysis requires that one be able to recognize the plaintext. Steganography requires that one NOT be able to recognize the cryptography from random noise. So, if I use a legal

Re: Building crypto archives worldwide to foil US-built Berlin Walls

1998-12-15 Thread Russell Nelson
Enzo Michelangeli writes: JYA and others, The first Hong Kong free crypto archive is up and running at: ftp://ftp.futuredynamics.com/freecrypto/ At the moment I'm just mirroring ftp.pgpi.com (about 119 Mb). More stuff will be hopefully added later. Also, I hope to announce

Re: Is a serial cable as good as thin air?

1998-12-01 Thread Russell Nelson
Arnold G. Reinhold writes: I am uncomfortable with the tone of this thread. There is nowhere near enough information provided in Mr. Georgoudis' posting to conclude that hisbank's existing floppy disk transfer scheme is secure, much less render an opinion on the impact of a serial

RE: Is a serial cable as good as thin air?

1998-11-30 Thread Russell Nelson
Brown, R Ken writes: If I was a bank I would be very wary of proposals like "We would write our own transmission protocol. " That seems to introduce yet more complexity, not to mention maintenance effort and undiscovered bugs. It would seem safer (more conservative a bank might say) to