RSA expiry commemorative version of PGP?

2000-08-03 Thread Adam Back
So as the RSA patent is expiring, and the PGP folks are pissed at RSA for various underhand legal shenanigans, can we expect a PGP version with RSA on by default, perhaps released midnight 20 September as a ceromonial event at the party? What about a GnuPG version which includes RSA and IDEA, by

PGP version compatibility (Re: RSA expiry commemorative version of PGP?)

2000-08-03 Thread Adam Back
Frank Tobin writes: > My proposal is realistic in the face that RFC 2440 is the standard > to follow. One problem that people face today is that they still > only think there are 3 real classes of PGP implementations out > there; PGP 2.x, PGP 5.x and above, and GnuPG. However, as more and > mor

Re: RSA expiry commemorative version of PGP?

2000-08-03 Thread Adam Back
I beg to differ. The fastest way to get people to upgrade is if the new version works with the old version. There are still many pgp2.x users who don't upgrade because they then lose the ability to communicate with other 2.x users. If PGP Inc had done the right thing and made pgp5.x backwards

Re: Is PGP broken?

2000-11-28 Thread Adam Back
No, it's not just you, it is indeed broken. So there are a number of culprits: - Probably mainly RSA for being difficult to deal with, and in general letting lose a bunch of rabid lawyers on the crypto community. Fortunately the patent has no expired. - PGP/NAI for shipping versions without RS

Euro-Telecoms Standards gives access to GSM & other specs

1998-11-05 Thread Adam Back
Someone pointed out this information to me. The European Telecommunications Standards Institute (ETSI) have granted access to allow everyone, not just members, to their specifications. These include the GSM specs. Start here: http://webapp.etsi.org/publicationssearch/ Adam

Re: new 448 bit key by Indian firm

1998-11-06 Thread Adam Back
Bill Stewart writes: > 448 bits sounds a lot like MD5-based encryption - perhaps > Luby-Rackoff or MDC? Or a homegrown system, doing successive MD5s > or something? MD5 is no longer the safest hash these days More likely Blowfish for two reasons i) the article mentioned blowfish at the bot

Re: Is a serial cable as good as thin air?

1998-12-03 Thread Adam Back
David Conrad writes: > On Wed, 2 Dec 1998, Dianelos Georgoudis wrote: > > I will include a random delay to invalidate timing attacks. > > The right solution is to ensure that all encryptions, decryptions, > signings, or signature verifications take the same amount of time. > (The maximum, wor

a unbiased lawyer on Wassenaar (Re:Foil to Wassenaar)

1998-12-14 Thread Adam Back
Forwarded below Nicholas Bohm (a lawyer and frequent poster to ukcrypto) injecting some reality into ex NSA lawyer Stewart Baker's FUD. Adam == Date: Tue, 08 Dec 1998 22:28:34 + To: [EMAIL PROTECTED] From: Nicholas Bohm <[E

obtaining confidentiality from authentication keys (Re: DCSB: Risk Management is Where the Money Is; Trust in Digital )Comm

1998-11-13 Thread Adam Back
Jeff.Hodges writes: > quick semi-newbie question.. > > [EMAIL PROTECTED] said: > > But if a certified public key can be used for encryption and not just > > signature verification, the corresponding private key must be > > escrowed, and available to law enforcement within an hour of a > > war

building a better zyklon-B (Re: KRA on ADK vs KR, NAI membership)

1998-11-24 Thread Adam Back
Writing about PGP's key recovery mechanism (CMR (Commercial Message Recovery) or ADK (Additional Decryption Key)), Dave Del Torto quotes from a letter he sent to [EMAIL PROTECTED]: > I'm not aware of the KRA's public position on the recovery of > plaintext using cryptographically sound and ethic

Re: Is a serial cable as good as thin air?

1998-12-01 Thread Adam Back
re. the use of a serial cable rather than an air gap / sneaker net (floppy disk). One thing that occurs is that if you were not careful the system might be used to mount a timing attack against the back-end machine. See Paul Kocher's RSA timing attack. Timing attacks may be possible without co

Re: Intel announcements at RSA '99

1999-01-27 Thread Adam Back
Colin and others write about getting at the raw data stream (in the P3 HRNG). This is obviously a good thing for the reasons others have discussed (fewer transistors, better assurance, you get my vote on that Colin). However, if the threat model is a highly resourced attacker (such as say a hos

Re: bearer = anonymous = freedom to contract

1999-02-16 Thread Adam Back
Wei Dai writes: > Suppose you have a payment system that works like this: > > [check settlment procedure] > > [...] > > But to move away from terminology for a moment, if people really want > instant settlement and don't care too much about privacy, is there any > reason to expect that somethi

high availability domains, dns, eternity

1999-03-03 Thread Adam Back
could cache or store the domain / public key binding and detect rogue domain updates. Adam [1] `The Eternity Service', Ross Anderson, http://www.cl.cam.ac.uk/users/rja14/eternity/eternity.html [2] Eternity Server, Adam Back, http://www.dcs.ex.ac.uk/~aba/eternity/announce.txt http://www.dcs.ex

Re: Crypto for some of the DNS/TM mess

1999-03-04 Thread Adam Back
Ben writes: > Anonymous wrote: > > The ability to register a few identities which would survive a challenge > > won't be too helpful for people who want to secretly register thousands > > of DNs without their duplicity being detected... > > Sure, but suppose I own a block of flats, or an office

Re: Crypto for some of the DNS/TM mess

1999-03-05 Thread Adam Back
Anonymous writes: > Adam Back writes: > > The basic problem is that chaumian credentials are transferable. > > That's a good thing about Anna Lysyanskaya's credential system. > [...] to let someone else use one of your [...] credentials, you > have to give them

Re: (eternity) high availability domains, dns, eternity

1999-03-05 Thread Adam Back
Bill proposes an alternative DNS system to allow third party verification of server integrity, which I'll comment on below. A meta-comment though, is that my earlier proposal (as well as Bill's proposal) are essentially integrity verification functions on the domain database. They don't prevent

Re: RSA Test

1999-03-11 Thread Adam Back
Eric Rescorla writes: > Vin McLellan <[EMAIL PROTECTED]> writes: > > If you are waiting for NIST to offer the sort of full crypto module > > validation tests that are offered to provide assurance for the DSA/Fortezza > > version of FIPS-186(a), don't hold your breath. > > I'm not. I'd simply

write code outside US (Re: so why is IETF stilling adding DES to protocols?)

1999-06-25 Thread Adam Back
Tom Weinstein writes: > I think your view only makes sense if you are only interested in > protecting yourself against entities who have $100,000 (or $50,000, > or whatever) to build a DES cracking machine. If, on the other > hand, you're also worried about 12 year old kids who pass around > lis

Re: so why is IETF stilling adding DES to protocols? (Re: It's official... DES is History)

1999-06-25 Thread Adam Back
Tom Weinstein writes: > Adam Back wrote: > > Jeff Schiller writes: > > > > > I presume that the TLS WG is planning to use DES to replace the RC4 > > > 40 bit cipher that was used for export compliance. > > > > I saw no indication that this was the

stealth, stego & pgp (Re: Eason/Kawaguchi stego)

1999-07-01 Thread Adam Back
On how to stego pgp messages. First you have to ensure that the data you are stegoing has a rectangular distribution with even probability of {0,1} for each bit, and apply your stego technique. Various ideas have been discussed, but as anonymous suggests this has all been worked out for PGP 2.x

fairness & liveness wrt /dev/[u]random (Re: linux-ipsec: Re: TRNG, PRNG)

1999-07-30 Thread Adam Back
Anonymous writes about competition for /dev/random arising from other processes and from processes using /dev/urandom which will use /dev/random when available. ("Use" in the sense that it reseeds using the /dev/random, and I take it from anonymous analysis actually removes bytes from /dev/rando

NSA aka 'Big Brother' in Lotus Notes

1999-09-04 Thread Adam Back
btw. I had a go at reverse engineering Lotus Notes a few months back to get the NSA's key out of it. I found the key, and the DN (Distinguished Name -- the name attatched to the key) was 'Big Brother'. Spooky huh? Someone at IBM had a sense of humor, or a sense of resentment about having to im

NSA & MSFT CAPI keys as PGP keys

1999-09-06 Thread Adam Back
[This struck me as having an entropy of at least 2048 bits so I'm passing it on --Perry] Anonymous provided the NSA and Microsoft CAPI keys in hex, so here are their RSA CAPI keys formatted as PGP keys. I've signed them. I put the keys at: http://www.dcs.ex.ac.uk/~aba/nsakey/ Ad

plausible CAPI recovery designs (Re: FW: Cryptonym...)

1999-09-09 Thread Adam Back
This general area of discussion -- software modification authentication -- is a bit fuzzy: if you can modify the software you can patch out the check of the signature (a correctly placed NOP is known to do it). However, and for example in the FIPS 140-1 crypto software validation program, you

MSFT's NSA key as key escrow solution

1999-09-13 Thread Adam Back
Several people (Carl Ellison?, others) have suggested over the years of the key escrow debate that if the government wants a voluntary key escrow system all they have to do is publish a public key, and anyone wanting to use it can Cc them. A good source of a public key we know is the NSA's publi

Re: Ecash without a mint

1999-09-20 Thread Adam Back
Anonymous writes: > Consider the following system, not yet completely practical, but perhaps > with some more work it could be made so. Features: > > - A "mint" is used only to create the initial allocation of ecash. >After that it is not needed. > > - Complete anonymity as with Chaum ec