Re: [cryptography] Implementing constant-time string comparison

2014-06-18 Thread D. J. Bernstein
John Gilmore writes, on a semi-moderated mailing list: > A bugfree C compiler Bwahahaha. That's funny. A large part of the game here is to envision the screwups that people will make and build systems that survive those screwups. For example, it's common to have C code such as x ? MACRO_A : M

Re: [cryptography] ECC curves that are safe safecurves.cr.yp.to

2014-01-20 Thread D. J. Bernstein
Peter Gutmann writes (on one of the harder-to-use mailing lists): > Some of their objections seem pretty subjective though, I mean they > don't like the Brainpool curves Actually, the Brainpool curves _meet_ the rigidity requirement that you're alluding to. The SafeCurves site displays this in the

[cryptography] another Certicom patent

2014-01-07 Thread D. J. Bernstein
Dan Brown writes, on the semi-moderated c...@irtf.org list: > I agree with your multiple PK algs suggestion, for parties who can afford it. > What about sym key algs? Maybe too costly for now? > By the way, this kind of idea goes back at least as far as 1999 from > Johnson and Vanstone under the na

[cryptography] ECC patent FUD revisited

2014-01-05 Thread D. J. Bernstein
NSA's Kevin Igoe writes, on the semi-moderated c...@irtf.org list: > Certicom has granted permission to the IETF to use the NIST curves, > and at least two of these, P256 and P384, have p = 3 mod 4. Not > being a patent lawyer, I have no idea what impact the Certicom patents > have on the use of n

Re: [cryptography] [Cryptography] RSA is dead.

2013-12-23 Thread D. J. Bernstein
Peter Gutmann writes (on the moderated cryptogra...@metzdowd.com list): > Any sufficiently capable developer of crypto software should be > competent enought to backdoor their own source code in such a way that > it can't be detected by an audit. Some of us have been working on an auditable crypto

Re: [cryptography] What is the state of patents on elliptic curve cryptography?

2013-08-25 Thread D. J. Bernstein
n patent 6141420, but there's very solid prior art for that one, and in any case it'll expire in July 2014. ---D. J. Bernstein Research Professor, Computer Science, University of Illinois at Chicago ___ cryptography mailing list

Re: [cryptography] urandom vs random

2013-08-16 Thread D. J. Bernstein
res documented on http://factorable.net. But fixing this configuration bug has nothing to do with the /dev/random superstitions. ---D. J. Bernstein Research Professor, Computer Science, University of Illinois at Chicago ___ cryptography

Re: [cryptography] Web Cryptography API (W3C Working Draft 8 January 2013)

2013-03-10 Thread D. J. Bernstein
doesn't imply that NaCl is what developers want, but high-profile applications such as DNSCrypt are in fact using NaCl in ways that seem easily generalizable to other applications. ---D. J. Bernstein Research Professor, Computer Science, University of Illinois at Chicago ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] cjdns review

2012-10-05 Thread D. J. Bernstein
o_box() for every packet does _not_ imply public-key cryptography for every packet. ---D. J. Bernstein Research Professor, Computer Science, University of Illinois at Chicago ___ cryptography mailing list cryptography@randombit.net http://lists.random

Re: [cryptography] abstract: Air to Ground Quantum Key Distribution

2012-09-20 Thread D. J. Bernstein
//cr.yp.to/talks/2009.10.06/slides2.pdf for a more detailed cost-benefit analysis. ---D. J. Bernstein Research Professor, Computer Science, University of Illinois at Chicago ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/

[cryptography] Last call: DIAC: Directions in Authenticated Ciphers

2012-06-19 Thread D. J. Bernstein
- SipHash: a fast short-input PRF (Aumasson, Bernstein) - Stronger security guarantees for authenticated encryption (Boldyreva, Paterson, Stam) - Suggestions for hardware evaluation of cryptographic algorithms (Gurkaynak) See you in Stockholm! ---D. J. Bernstein

[cryptography] DIAC: Directions in Authenticated Ciphers

2012-05-02 Thread D. J. Bernstein
forgeries (Minematsu et al.). * Many breaks in "encrypt only; authentication is too slow" IPsec. * Keeloq door/car/garage RFID completely broken (Eisenbarth et al.). * More broken "AES is too big" RFID proposals: HB, HB+, etc. To summarize: Yes, non-cryptographic

Re: [cryptography] Duplicate primes in lots of RSA moduli

2012-02-16 Thread D. J. Bernstein
m is to centralize these details and get them right rather than having everybody reimplement them badly. It would be interesting to understand how /dev/urandom failed for the repeated RSA primes---I'm presuming here that /dev/urandom was in fact the main culpri

Re: [cryptography] Digest comparison algorithm

2011-12-02 Thread D. J. Bernstein
ng various cryptographic disasters addressed by this library) ---D. J. Bernstein Research Professor, Computer Science, University of Illinois at Chicago ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailma