Re: [cryptography] Underhanded Crypto Contest - All Entries Published

2015-03-22 Thread shawn wilson
I skimmed a few of those and noticed two submissions for signature issues: RyanCastellucci, and AleksanderEssex. Is it normal for people to find issues with the signing/verification process or is this just coincidence? On Sat, Mar 21, 2015 at 5:44 PM, Adam Caudill a...@adamcaudill.com wrote: FYI

Re: [cryptography] Unbreakable crypto?

2015-03-22 Thread Jeffrey Goldberg
On 21 Mar 2015, at 22:24, Lee wrote: On 3/21/15, Jeffrey Goldberg jeff...@goldmark.org wrote: (1) the file isn't secret But the fact that I'm using it as my one-time pad is. Why isn't that good enough? As others have already answered, your key is knowledge of which publicly available file

Re: [cryptography] Unbreakable crypto?

2015-03-22 Thread Michael Kjörling
On 21 Mar 2015 21:17 -0700, from sch...@eff.org (Seth David Schoen): *True random pad*: Attacker doesn't know whether pad k₁ is actually more likely than pad k₂, if (c ⊕ k₁) and (c ⊕ k₂) both appear to be equally plausible plaintexts. *Choosing a meaningful file but keeping secret which one

Re: [cryptography] Unbreakable crypto?

2015-03-22 Thread Givon Zirkind
agreed. On 3/21/2015 5:18 PM, John Levine wrote: Would a commonly available large binary file make a good one-time pad? Something like ubuntu-14.10-desktop-amd64.iso12 maybe.. Unlkely for two reasons. One is that the point of a one-time pad is that only the sender and recipient are supposed

Re: [cryptography] Unbreakable crypto?

2015-03-22 Thread Michael Kjörling
On 22 Mar 2015 09:36 -0500, from jeff...@goldmark.org (Jeffrey Goldberg): There are good crypto systems in use which generate pseudo-random pads from keys that are 128 (or 256) bits in length. But these are – at best – no better than the length of their keys. Which is, admittedly, _quite good

Re: [cryptography] Unbreakable crypto?

2015-03-22 Thread Michael Kjörling
On 22 Mar 2015 10:50 -0400, from givo...@gmx.com (Givon Zirkind): I was tempted by the promise of software to run a one-time pad on my machine. I am a fool and I fall upon my own sword. An unauthenticated one-time pad is trivial to implement; it's literally a few lines of code in any

Re: [cryptography] Unbreakable crypto?

2015-03-22 Thread Greg Rose
If we haven't argued it enough by now, he'll never get it. Either way I would ask people to stop this discussion before I have to unsubscribe from yet another once-useful discussion list. Greg. Phone: +1 619 890 8236 GPG/PGP: 1081A37C 232B EC8F 44C6 C853 D68F E107 E6BF CD2F 1081 A37C

Re: [cryptography] Unbreakable crypto?

2015-03-22 Thread Jon Callas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Here's an optimization: * Assume you have a decent One Time Pad generator. * Assume you have a secure pad delivery system. * Assume it is reasonably low-latency and high-volume. Say somewhere between Usenet and the modern Internet. Now then --

Re: [cryptography] Unbreakable crypto?

2015-03-22 Thread Jeffrey Goldberg
On 22 Mar 2015, at 9:48, Michael Kjörling wrote: On 22 Mar 2015 09:36 -0500, from jeff...@goldmark.org (Jeffrey Goldberg): There are good crypto systems in use which generate pseudo-random pads from keys that are 128 (or 256) bits in length. But these are – at best – no better than the length

Re: [cryptography] Unbreakable crypto?

2015-03-22 Thread Enrique Soriano
Right. An ISO file is a bad choice - too many zeros machine code isn't very random. But what about something like an MP3, OGV or some other compressed file? No! The requirements for the Vernam cipher are very simple: - the pad must be random - the pad must not be reused - the pad must

Re: [cryptography] Unbreakable crypto?

2015-03-22 Thread mtm
whos to say? we're jus trapt on erf together. On Mar 21, 2015 11:37 PM, Seth David Schoen sch...@eff.org wrote: Lee writes: On 3/21/15, Jeffrey Goldberg jeff...@goldmark.org wrote: [Apologies for quoting badly] No! A thousand times no. (1) the file isn't secret But the