Re: Cryptographic Algorithm Metrics

2001-01-08 Thread lcs Mixmaster Remailer
Burton Rosenberg writes: > There is the concept of Kolomogorov complexity, the size of the > smallest algorithm that can generate the message. A perfectly > compressed message would have Kolomogorov complexity > equal to itself. > > Kolomogorov complexity does have a freedom in its definition, > b

Re: Cryptographic Algorithm Metrics

2001-01-06 Thread burton rosenberg
There is the concept of Kolomogorov complexity, the size of the smallest algorithm that can generate the message. A perfectly compressed message would have Kolomogorov complexity equal to itself. Kolomogorov complexity does have a freedom in its definition, but the exciting thing is that any two

Re: Cryptographic Algorithm Metrics

2001-01-06 Thread Bill Stewart
Single DES is obviously a mistake - the "24 hours/$200K" limit is so closely what it took to crack DES, using either the EFF's ~$250K cracker or Distributed.net's internet-based crack, that it's clearly referring to DES. Back when DES was _designed_, it was computationally secure, for values of "

Re: Cryptographic Algorithm Metrics

2001-01-04 Thread lcs Mixmaster Remailer
"Perfect compression" doesn't make sense anyway. Perfection of compression (as with entropy) can be expressed only relative to a specific probability distribution of possible inputs. Once you have specified such a probability distribution, you can evaluate how well a particular compression algor

Re: Cryptographic Algorithm Metrics

2001-01-04 Thread Kris Kennaway
On Thu, Jan 04, 2001 at 01:23:30AM +, Paul Crowley wrote: > Peter Fairbrother <[EMAIL PROTECTED]> writes: > > Not so. Perfect compression with encryption works too. > > Er, does it? I get a 1k message from you, perfectly compressed and > then encrypted with some strong algorithm and a 128-bi

Re: Cryptographic Algorithm Metrics

2001-01-04 Thread Paul Crowley
Paul Crowley <[EMAIL PROTECTED]> writes: > Peter Fairbrother <[EMAIL PROTECTED]> writes: > > Not so. Perfect compression with encryption works too. > > Er, does it? I get a 1k message from you, perfectly compressed and > then encrypted with some strong algorithm and a 128-bit key. As a > godli

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Arnold G. Reinhold
At 10:38 PM + 1/3/2001, Peter Fairbrother wrote: >on 3/1/01 9:25 pm, Greg Rose at [EMAIL PROTECTED] wrote: > > > At Crypto a >> couple of years ago the invited lecture gave some very general results >> about unconditionally secure ciphers... unfortunately I can't remember >> exactly who gave t

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Greg Rose
A couple of people have taken me to task for complicating the question about One Time Pads. The purpose of my original text was just to say that yes, there are other useful and deployed algorithms out there that have unconditional security, and that it is not the case that One Time Pads are sp

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Paul Crowley
Peter Fairbrother <[EMAIL PROTECTED]> writes: > Not so. Perfect compression with encryption works too. Er, does it? I get a 1k message from you, perfectly compressed and then encrypted with some strong algorithm and a 128-bit key. As a godlike being unhindered by constraints of computational po

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Ray Dillinger
On Wed, 3 Jan 2001, Peter Fairbrother wrote: >on 3/1/01 9:25 pm, Greg Rose at [EMAIL PROTECTED] wrote: >> Goldreich... forgive me if I'm wrong. The important result, though, was >> that you need truly random input to the algorithm in an amount equal to the >> stuff being protected, or you cann

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Ben Laurie
Peter Fairbrother wrote: > > At Crypto a > > couple of years ago the invited lecture gave some very general results > > about unconditionally secure ciphers... unfortunately I can't remember > > exactly who gave the lecture, but I think it might have been Oded > > Goldreich... forgive me if I'm wr

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Ben Laurie
Greg Rose wrote: > > At 03:06 PM 1/3/2001 -0500, John Young wrote: > >Yes, the one-time pad. However, I wondered if Smith > >was hinting at another cipher(s) not yet publicized, > >perhaps computational -- or more exotic technology > >such as quantum, DNA, ultra-spectral and beyond. > > It alway

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Peter Fairbrother
on 3/1/01 9:25 pm, Greg Rose at [EMAIL PROTECTED] wrote: > At 03:06 PM 1/3/2001 -0500, John Young wrote: >> Yes, the one-time pad. However, I wondered if Smith >> was hinting at another cipher(s) not yet publicized, >> perhaps computational -- or more exotic technology >> such as quantum, DNA, ul

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Greg Rose
At 03:06 PM 1/3/2001 -0500, John Young wrote: >Yes, the one-time pad. However, I wondered if Smith >was hinting at another cipher(s) not yet publicized, >perhaps computational -- or more exotic technology >such as quantum, DNA, ultra-spectral and beyond. It always amazes me that people single out

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Paul Crowley
dmolnar <[EMAIL PROTECTED]> writes: > On Wed, 3 Jan 2001, Ben Laurie wrote: > > > > A cipher is Conditionally Computationally Secure > > > (CCS) if the cipher could be implemented with keys > > > that are not quite "long enough" or with not quite > > > "enough" rounds to warrant a CS rating. Exa

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread John Young
Yes, the one-time pad. However, I wondered if Smith was hinting at another cipher(s) not yet publicized, perhaps computational -- or more exotic technology such as quantum, DNA, ultra-spectral and beyond. The workshop's purpose was to discuss what security standards might be established to assure

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread dmolnar
On Wed, 3 Jan 2001, Ben Laurie wrote: > > A cipher is Conditionally Computationally Secure > > (CCS) if the cipher could be implemented with keys > > that are not quite "long enough" or with not quite > > "enough" rounds to warrant a CS rating. Examples: > > SKIPJACK and RSA. This seems a bit

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Ben Laurie
John Young wrote: > > Last summer, at a workshop on "Security Metrics," conducted > by NIST's Computer System Security and Privacy Advisory > Board, Landgrave Smith, Institute of Defense Analysis, reported > on a pilot study of "the metrics used for determining the > strength of cryptography." >

Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Ray Dillinger
As I suppose others on the list have pointed out by now, he is just plain wrong about DES. DES is not computationally secure in this terminology. It is either Conditionally Computationally Secure or Weak. Bear On Wed, 3 Jan 2001, John Young wrote: >Last

Cryptographic Algorithm Metrics

2001-01-03 Thread John Young
Last summer, at a workshop on "Security Metrics," conducted by NIST's Computer System Security and Privacy Advisory Board, Landgrave Smith, Institute of Defense Analysis, reported on a pilot study of "the metrics used for determining the strength of cryptography." http://csrc.nist.gov/csspab/j