Re: webcam encryption beats quasar encryption

2006-03-30 Thread James Muir
Heyman, Michael wrote: Internet webcam signals from webcams could emerge as an exotic but effective new tool for securing terrestrial communications against eavesdropping. > > Kidding aside, there are some interesting theoretical results about ciphers that utilize a plentiful, publicly avail

Re: [Cfrg] HMAC-MD5

2006-03-30 Thread vlastimil . klima
I think that we have the "evidence". The security MD5 depends heavily on a lot of nonlinearities in functions F,G,I and on carries in arithmetic additions. Nonlinearities in F,G,I are bitwise and very weak. Carries are much stronger, but the collision attacks showed that it is possible to controll

Re: [Cfrg] HMAC-MD5

2006-03-30 Thread "Hal Finney"
I (Hal Finney) wrote: > A couple of (rather uninformed) thoughts regarding HMAC-MD5: First, > how could collision attacks be extended to preimage attacks? And second, > how would preimage attacks affect HMAC-MD5? I have to apologize for that message; I was totally confused particularly in the se

webcam encryption beats quasar encryption

2006-03-30 Thread Heyman, Michael
Internet webcam signals from webcams could emerge as an exotic but effective new tool for securing terrestrial communications against eavesdropping. Scientists have come up with a method for encrypting messages using the internet objects, which emit signals and are thought to be powered by DC

Re: Your secrets are safe with quasar encryption

2006-03-30 Thread Alexander Klimov
On Wed, 29 Mar 2006, Sean McGrath wrote: > He adds that the method does not require a large radio antenna or > that the communicating parties be located in the same hemisphere, as > radio signals can be broadcast over the internet at high speed. It sounds like "encrypting" $P$ by xoring it with ra

Re: Your secrets are safe with quasar encryption

2006-03-30 Thread Adam Back
How many suitable quasars are there? You'd be damn lucky if its a cryptograhic strength number. Now you might think there are limits to how many signals you can listen to and that would be some protection, however you still have brute force guess a signal, and probability of guessing the right ke