Re: "Damn Furriners" :-)

1999-01-24 Thread bram
ationals present? Not if you didn't go around talking about it. -Bram

Re: quantum cryptanalysis

1999-02-05 Thread bram
many queries to the oracle to encrypt but exponentially many queries to the oracle to crack, the encrypter wins. No, I don't have any clue how an algorithm like that might work. -Bram

Re: quantum cryptanalysis

1999-02-05 Thread bram
On Fri, 5 Feb 1999, bram wrote: > I have a theory that no matter what computing machine is available, as > long as the same machine is available to both the encrypter and the > cracker, the cracker wins (barring non-turing complete machinery, of > course.) Jim Gillogly pointe

Re: Using crypto to solve a part of the DNS/TM mess

1999-02-28 Thread bram
long as all the goofing around was done beneath a single top-level domain which noone was ever going to use, it might be possible to win that battle. -Bram

Re: Using crypto to solve a part of the DNS/TM mess

1999-03-02 Thread bram
ually. Does anybody know if/how it's possible to get domain names in the now defunct .su ? Do you have to be grandfathered in? Is there a chance that just unilaterally grabbing one might work? -Bram (Thinking he should get a domain in .to - that WIPO DNS paper looked kinda scary)

Re: obtaining FIPS-140a

1999-05-17 Thread bram
/pubs/fip140-1.htm -Bram (altavista is your friend)

Re: Bridge

1999-06-25 Thread bram
80 bits of entropy for *any* amount of random numbers if you use a crypographically strong pseudo random number generator. -Bram

Re: Word needed for Entropy

1999-06-28 Thread bram
27;s generally obvious that I mean it in a cryptographic sense, rather than a physics sense. -Bram

Re: depleting the random number generator

1999-07-17 Thread bram
cally large. I'm not sure if anybody's yarrowified /dev/random yet - I think someone from coderpunks was working on it. -Bram

Re: depleting the random number generator

1999-07-17 Thread bram
have come up with are based on using secure hashes. -Bram

Re: depleting the random number generator

1999-07-18 Thread bram
On Sat, 17 Jul 1999, Eugene Leitl wrote: > bram writes: > > > Most of the fancy reseedable PRNG schemes people have come up with are > > based on using secure hashes. > > They are sure validated, but are they the best we can do? MD5, the > nonplusultra, really?

Re: depleting the random number generator

1999-07-18 Thread bram
at model pretty well - http://www.counterpane.com/yarrow.html > so if you need the high quality randomness, you need hardware randomizers. Those are helpful as well, but should still never be used in the raw - their entropy output should be estimated conservatively and fed into a reseedable PRNG. -Bram

RE: depleting the random number generator

1999-07-19 Thread bram
hich doesn't deplete entropy and the problem will go away. And yes, it is possible to do that in a secure manner. -Bram

Re: depleting the random number generator

1999-07-19 Thread bram
asure, and pool it to be introduced in large enough chunks to prevent continuation attacks, but the short answer is yes. -Bram

Re: TRNG, PRNG

1999-07-22 Thread bram
whichever comes *LAST*, and where N and Z are chosen to ensure a good > leverage ratio. a) and b) don't help much - the true answer is c). As for getting entropy when the machine is first started up, it will have to block a bit until enough is collected, but after that is done once it can purr right along. -Bram

Re: depleting the random number generator

1999-07-26 Thread bram
e last keystroke. (which means, interestingly enough, that you can get faster entropy harvesting by having a more precise clock.) -Bram

Re: depleting the random number generator

1999-07-26 Thread bram
s the state of the pool at some point and manages to control all attempted reseedings. -Bram

Re: depleting the random number generator -- repeated state

1999-07-28 Thread bram
there is a failure, and an attacker does find out what the internal state of the pool is, it won't be useful for long. -Bram

Re: depleting the random number generator -- repeated state

1999-07-28 Thread bram
also like to > capitalize on the properties of hash functions for prepping the entropy. You basically have to do that to prevent chosen entropy attacks, and it's a good idea to pool the entropy anyway to prevent continuation attacks. -Bram

Re: Proposal (was Summary re: /dev/random)

1999-08-02 Thread bram
and SHA-1 for internal mixing. I think the 160 bit safety involved in both SHA-1 and RIPEMD-160 will continue to be excessive for many years to come, so there's no reason to worry about it being 'too small'. -Bram

Re: Summary re: /dev/random

1999-08-02 Thread bram
h are necessary to snoop > the RNG state will also allow for more malicious actions that completely > compromise security. The way to diddle with RNG state is to mess with it's sources, not by directly looking inside the state. Attacks of that form, even if they aren't 'practical' now, could easily become practical in the future. -Bram

Re: Summary re: /dev/random

1999-08-04 Thread bram
py and threat models and all that yadda yadda yadda which most developers will rightfully recoil from getting into when all they want is a few random bytes. -Bram

Intel RNG

1999-09-16 Thread bram
heir RNG, I just think it's likely that the raw output displays some subtle bias, and they either knew about it or decided to just play it safe, and put the whitening in. -Bram

Re: Why did White House change its mind on crypto?

1999-09-18 Thread bram
t I don't fear it being enforced. "I can't say that because it would violate national security" was an oft-repeated refrain in the Iran-Contra affair. Like it or not, the 'national security' excuse has quite a bit of history to it and it's very naive to think it will just go away. -Bram

Re: Ecash without a mint

1999-09-20 Thread bram
formation offered by the prover, and using the bits of the secure hash of that as the challenges by the provee. -Bram

Re: Ecash without a mint, or - making anonymous payments practical

1999-09-27 Thread bram
ce new bills almost always have them with sequential serial numbers. There have been many cases of a huge heist getting pulled off successfully and then the robbers were unable to dispose of the cash they got because it was too easy to trace. -Bram

Re: Almost-Everywhere Superiority for Quantum Computing

1999-10-17 Thread bram
hich rely on quantum computation for efficient encryption which are strong against quantum decryption techniques, although I'll bet you could get the right people to speculate about it. -Bram

Re: IP: [FP] California inaugurates digital signatures - cnn.com

1999-10-20 Thread bram
natures doesn't change that at all. -Bram

Re: Flannery on Cayley-Purser/RSA

1999-11-11 Thread bram
k optimizing its implementation. That doesn't make the algorithm any more useful. -Bram

Re: ECHELON Watch

1999-11-16 Thread bram
it generates (two a day if my memory servers) are just too small to say much about individuals. Besides, violating individual rights is the FBI's job. -Bram

Re: FBI secret police

1999-01-17 Thread bram
terests are > contrary to the interests of the IETF and the Internet as a whole. It > is a male. And he is regularly reporting IETF member activities for > secret investigation. Beware. Or maybe it's just someone who reads published IETF literature. It's not like the IETF keeps it's activities all that secret. -Bram

Re: Spies in the 'forests'

1999-11-22 Thread bram
ings patented these days are going to be rediscovered sooner or later (generally sooner, often prior,) so you might as well patent the good idea just to keep anyone else from using it. -Bram

Re: Semantic Forests, from CWD (fwd)

1999-12-02 Thread bram
Maybe I'm just dense, but what's with the emphasis on phone conversations? Voice processing is flaky at best, and computationally expensive regardless. Faxes, on the other hand, can be OCR'ed easily, and email is in plaintext to begin with. -Bram

Re: Export control of Java VM ??

1999-12-03 Thread bram
a daily basis. Use a factory design pattern to produce new instances, and a naming service if you absolutely must be able to swap in new implementations at link or runtime, but whatever you do, don't give in to your emotional attachment to the old way. It really does suck. -Bram

Re: DeCSS Court Hearing Report

2000-01-03 Thread bram
ction. Similarly to a trade secret that has been leaked by a > person under NDA. This may be a legally naive idea, but I've always assumed that if something is no longer a secret, it's no longer a trade secret. Is that not the case? -Bram

Re: DeCSS Court Hearing Report

2000-01-03 Thread bram
ant without violating the original author's copyright? Does that mean that, say, Bsafe will have the rug yanked out from under it by allowing alternate non-infringing implementations? (Doesn't the RSA patent expire in October as well? That's a mighty funny coincidence ... for anyone other than RSA, anyhow.) -Bram

Re: PGP on an e-commerce site

2000-01-03 Thread bram
a definite weakness of current public key systems. It may seem boring and tedious to work out detailed legal meanings of what all the public key technical artifacts mean, but unless those artifacts refer to specific meanings themselves, a court will make them up later, and will probably make them up in a way which the original authors (meaning you) aren't happy with. -Bram

Re: DeCSS Court Hearing Report

2000-01-04 Thread bram
On Tue, 4 Jan 2000, Ray Hirschfeld wrote: > > Date: Mon, 3 Jan 2000 18:43:52 -0800 (PST) > > From: bram <[EMAIL PROTECTED]> > > > I'm a little confused. Are you saying that as of October it will be legal > > to do any amount of reverse-engineering, publis

Re: Killer PKI Applications

2000-01-11 Thread bram
topping active attacks, but right now almost everything on the internet is subject to passive attacks. Fix the first problem first, only then will it become clear how to solve the second problem. -Bram

Re: Blue Spike and Digital Watermarking with Giovanni

2000-01-16 Thread bram
ry distributing a few xeroxed $100 bills, and > time how long it takes until the feds knock on your door). Do you have a reference for that? [There have been SO many articles on this recently, including a long thread on RISKS: the summary being that it is absolutely true. --Perry] -Bram

Re: prove me wrong, go to jail

2000-01-28 Thread bram
had some paperwork problems on it though - a while after I had deposited my check they mailed me asking if I'd ever gotten one. -Bram

Re: legal status of RC4

2000-01-28 Thread bram
actly constitutes 'causing customer confusion' with regards to using the term RC4. If I publish something clearly labelled 'Bram's crypto library' and list RC4 as one of the ciphers supported, there's no implication of anything coming from RSA, it comes from Bram. The

Re: [PGP]: PGP 6.5.2 Random Number Generator (RNG) support

2000-02-02 Thread bram
er repeats. The work on the studying the output of Intel's RNG has only had accessed to the post-processed output, plus I believe a file directly from Intel which was claimed to be unprocessed output. Yeah ... right. If Intel wants people to trust them, they should quit acting like they're coving for bad engineering. -Bram

Re: [PGP]: PGP 6.5.2 Random Number Generator (RNG) support

2000-02-05 Thread bram
7;s no satisfying some people. Ad hominen attacks and claims of unfalsifiability being reasonable aside, there is something which would make me happy. Chip manufacturers reverse-engineer each other's stuff all the time. I'd like one of Intel's competitors to publically state 'We took apart a Pentium III and it's RNG really works the way Intel says.' -Bram

Looking for a cryptographic primitive

2000-03-09 Thread bram
Does anybody know of a field in which a + b and a * b can be computed quickly but (and this is important) it's computationally intractable to compute the additive inverse of a? I need it for a technique I'm working on. -Bram [Bram: All fields of n elements are isomorphic to all other

Re: Looking for a cryptographic primitive

2000-03-09 Thread bram
On Thu, 9 Mar 2000, bram wrote: > Does anybody know of a field in which a + b and a * b can be computed > quickly but (and this is important) it's computationally intractable to > compute the additive inverse of a? > > [Bram: All fields of n elements are isomorphic to all

Re: Comcast@Home bans VPNs

2000-08-26 Thread Bram Cohen
ou can tunnel PPP over SSH ... -Bram Cohen

Re: Oh for a decently encrypted mobile phone...

2000-09-14 Thread Bram Cohen
tem is so unreliable. Senior commanders be-lieve > that the reliability of mobile phones outweighs the increased risk of > conversations being intercepted. Wouldn't it be ironic if they resort to buying a bunch of stariums ... -Bram Cohen [That would require that Stariums actually app

Re: Rijndael among the weakest of the AES candidates

2000-10-03 Thread Bram Cohen
rribly worrisome. The existence of a very impractical attack against 7 rounds hardly changes things much, especially in light of Rijndael being very simple and hence relatively easy to analyze. -Bram Cohen

Re: Lots of random numbers

2000-11-16 Thread Bram Cohen
feeding it through an appropriate PRNG, further seeding prevents attacks which are merely theoretical. -Bram Cohen

Re: Schneier: Why Digital Signatures are not Signatures (was Re: CRYPTO-GRAM, November 15, 2000)

2000-11-18 Thread Bram Cohen
already be that way - if so, never mind.) -Bram Cohen

Re: Is PGP broken?

2000-11-28 Thread Bram Cohen
message again'. The only real gotcha is that the first message is unencrypted, and that's not a big deal, especially when you know about it and always send a 'checking to make sure I got your address right' message to start things off. -Bram Cohen

Re: Is PGP broken?

2000-12-03 Thread Bram Cohen
On Wed, 29 Nov 2000, Ian BROWN wrote: > Bram Cohen wrote: > >What we really need is a system which just stops passive attacks. The best > >idea I've come up with so far is for all outgoing messages to have a > >public key attached, and if you have the public key of

Re: Is PGP broken?

2000-12-03 Thread Bram Cohen
On Sun, 3 Dec 2000, Ben Laurie wrote: > Bram Cohen wrote: > > > > Come to think of it, there are some tricky issues with regards to crypto > > on mailing lists, it might make sense to have a > > X-crypto-originator [EMAIL PROTECTED] line in the headers to specify that

RE: Is PGP broken?

2000-12-04 Thread Bram Cohen
gnore the mail headers and use the userID(s) > in the public key certificate included in the message. To clarify - I think doing things based on PGP userIDs is unworkable, and would like to do everything based on email addresses. -Bram Cohen

Re: /. Yahoo delivers encrypted email

2000-12-05 Thread Bram Cohen
surprised AOL isn't offering this "security feature" as well ... > I feel safer already :~) To be fair, Yahoo handles so much mail that the CPU power necessary to start SSL sessions for all of them gets pretty expensive. They'll probably start doing end-to-end encryption w

Re: migration paradigm (was: Is PGP broken?)

2000-12-05 Thread Bram Cohen
problem with it? --Perry] We already have too many common denominators. I'm waiting for something to stop looking like an experiment to actually start advocating use of a particular crypto application. -Bram Cohen

Re: migration paradigm (was: Is PGP broken?)

2000-12-05 Thread Bram Cohen
On Mon, 4 Dec 2000, Bram Cohen wrote: > > [SHA-2 looks pretty good. What's your problem with it? --Perry] It's slow. It's fast enough for most applications, but then again so is 3DES - either you care about speed or you don't, and if you do, SHA2 just doesn't rank

Re: migration paradigm (was: Is PGP broken?)

2000-12-10 Thread Bram Cohen
On Tue, 5 Dec 2000, David Honig wrote: > Is there a reason not to use AES block cipher in a hashing mode > if you need a secure digest of some data? Hashing modes of block ciphers require a re-key for every block, and hence are really, really slow. -Bram Cohen

Re: IBM press release - encryption and authentication

2000-12-10 Thread Bram Cohen
and not at all for things which require a lot. -Bram Cohen [Parallelism is NOT a trivial property. The maximum data rate you can sustain depends a lot on whether or not an algorithm can be implemented in parallel in hardware. Some algorithms, like various keyed hashes, have bad properties in this re

Re: IBM press release - encryption and authentication

2000-12-10 Thread Bram Cohen
e from patenting it and release it into the public domain. 2) to keep anyone from using it If you're not doing 1, you're doing 2. -Bram Cohen

Re: IBM press release - encryption and authentication

2000-12-11 Thread Bram Cohen
out the total lack of technical detail in the press release specifically. Thanks for the pointer. -Bram Cohen

Re: IBM press release - encryption and authentication

2000-12-11 Thread Bram Cohen
prove all that useful. It really does, as advertized, offer MAC for almost no overhead, and parallelization for free. It would be a shame for these modes to not get used because of stupid patent bullshit. -Bram Cohen (who thinks doing the xors as a gray code instead of binary countup was a nice touch.)

Re: UK Sunday Times: "Steal the face right off your head"

2000-12-11 Thread Bram Cohen
tes. > > What did I tell ya? The US military is switching over to biometrics, including fingerprints and cornea scans. One of the reasons they decided to do the switch is that newer technologies ensure that the item in front of the scanner is in fact alive :) -Bram Cohen

Re: IBM press release - encryption and authentication

2000-12-15 Thread Bram Cohen
mprovement in speed on a single CPU system. There's an improved version of the IBM mode at http://csrc.nist.gov/encryption/aes/modes/ in the 'OCB mode' paper. Clearly, it's a good idea to wait for new developments to stop happening to use the new modes. -Bram Cohen "M

Re: The problem with SSH2

2000-12-28 Thread Bram Cohen
On Wed, 27 Dec 2000, Theodore Y. Ts'o wrote: > From: Bram Cohen <[EMAIL PROTECTED]> > >The problem is that if someone performs MITM on you, you get a warning >saying 'I don't know who this is warning warning warning blah blah blah, >would yo

Envelope Mail

2000-12-29 Thread Bram Cohen
I've set up a home page for Envelope Mail, and included feedback which I got from my last post (thanks everybody!) It's at - http://gawth.com/bram/envelope_mail/ Any and all additional feedback and offers to help would be much appreciated. In particular, it could use a logo :-) -

More Envelope Mail stuff

2001-01-02 Thread Bram Cohen
h.com/bram/envelope_mail/ -Bram Cohen "Markets can remain irrational longer than you can remain solvent" -- John Maynard Keynes

Re: sniff tool that can crack SSL?

2001-01-08 Thread Bram Cohen
ch of credit card numbers anonymously. -Bram Cohen "Markets can remain irrational longer than you can remain solvent" -- John Maynard Keynes

New stuff with Envelope Mail

2001-02-13 Thread Bram Cohen
I've done a bunch more work on Envelope Mail, as always, the latest info is at - http://gawth.com/bram/envelope_mail/ New is actual code, complete with test code. Plans are next to write a patch for BoboMail implementing the dummy version of the crypto API. I could use immediate help o

A recurrence relation question

2000-03-25 Thread Bram Cohen
This isn't obviously crypto-related, but I'll explain if there's a simple solution. Given that f(x+1) = f(x) * f(x) + c, does anybody know how to express f(x) in closed form? -Bram Cohen

A non-parellelizable form of hashcash

2000-03-25 Thread Bram Cohen
f(w) quickly using the formula f(n) = s^(2^n) + s^(-(2^n)) (mod p) Which can be easily proven by induction. Not only does this technique prevent paralellization, but it sets the amount of work Bob has to do very precisely. A surprisingly simple result. -Bram Cohen

Re: A non-parellelizable form of hashcash

2000-03-25 Thread Bram Cohen
On Sat, 25 Mar 2000, Bram Cohen wrote: > Alice is capable of computing f(w) quickly using the formula > > f(n) = s^(2^n) + s^(-(2^n)) (mod p) I neglected to point out that she does this by first computing e = 2^n (mod p-1) and then computing s^e (mod p) Which is equal to s^(2

Re: A non-parellelizable form of hashcash

2000-03-25 Thread Bram Cohen
ere is clearly an underlying theory we have yet to discover. -Bram Cohen

Re: A non-parellelizable form of hashcash

2000-03-27 Thread Bram Cohen
s way of factoring n using the oracle though. Other than that, they look about the same - there wouldn't be any noticeable difference in performance between the two algorithms. Mostly I just find the mess which the expansion of f(x)^2 - 2 becomes after a few iterations very comforting. -Bram Cohen

Some tweaks of time-release crypto/non-parallel hashcash

2000-04-18 Thread Bram Cohen
larger proof of work than the constant-sized one the previous technique does. Well, that's all I could come up with. Any thoughts/criticisms are welcome. -Bram Cohen

The difficulty of making non-hashable tokens

2000-04-18 Thread Bram Cohen
the reach of complexity theory these days.) Just thought I'd throw that out. Had to vent. Not being able to find one is getting on my nerves. -Bram Cohen

Re: The difficulty of making non-hashable tokens

2000-04-18 Thread Bram Cohen
date and a scrambled version of the login id. Then, if someone wants to demonstrate their login history they send you the dates and their id and you can verify it, but analyzing the database as a whole requires a lot of work. Well, so that's not a particularly strong motivation, but hopefully it clarifies. -Bram Cohen