Re: Lowercase compresses better?

2000-09-29 Thread staym
It would be true if they used a fixed set of huffman codes for which lower case letters had shorter codes; this is reasonable if you're compressing large amounts of text, since most of it is lowercase. -- Mike Stay Programmer / Crypto guy AccessData Corp. [EMAIL PROTECTED]

Recovering message from signature

1998-12-09 Thread staym
I seem to recall hearing of a signature scheme wherein the message is recovered from the signature. Does this ring a bell for anyone? Any pointers? -- Mike Stay Cryptographer / Programmer AccessData Corp. mailto:[EMAIL PROTECTED]

quantum cryptanalysis

1999-02-01 Thread staym
Suppose someone discovers a way to solve NP-complete problems with a quantum computer; should he publish? Granted, the quantum computers aren't big enough yet, but the prospects look bright for larger ones in the near future. It would break all classical cryptography. -- Mike Stay Cryptographer

Re: quantum cryptanalysis

1999-02-02 Thread staym
Ulrich: >Can you explain the halfing effect on the key length? Or may be you >have some pointers to the literature on that? Look up "Grover" on the Los Alamos National Labs pre-print site http://xxx.lanl.gov/find/quant-ph Searching a space with half the keylength is searching a space with the sq

rng

1999-03-30 Thread staym
Is it possible to choose a seed, multiplier, and modulus for a linear congruential generator such that it duplicates any finite list of positive integers? [No, but I'll let others expand or do it in another message. --Perry] -- Mike Stay Cryptographer / Programmer AccessData Corp. mailto:[EMAIL

Re: rng

1999-03-30 Thread staym
Arnold G. Reinhold wrote: > > You can see that Perry is right by a simple counting argument. Say the word > size is m bits. There are 2**(3*m) cvombinations of seed, multiplier, and > modulus and there are (2**m)! possible arangements of the values. The > latter is much bigger for m > 2. > >

Re: PGP encryption

1999-07-19 Thread staym
Hans wrote: >When implementing PGP base encryption, is this implementation MUST use >symetrically Algorithms ?? Is it possible to use only the >public/private key ? There currently isn't a way to do it under the OpenPGP Draft. Why would you want to? Symmetric algorithms are generally one or t

Re: salty ms products

1999-07-21 Thread staym
I wrote: >just enough room to store a password 16 unicode characters long, the >maximum length >password you're allowed It's actually 15 characters, so any prime between 2^240 and 2^256 will work. -- Mike Stay Cryptographer / Programmer AccessData Corp. mailto:[EMAIL PROTECTED]

salty ms products

1999-07-21 Thread staym
The encryption in MS Word / Excel uses 32 *bytes* of salt. It's interesting to me that this is just enough room to store a password 16 unicode characters long, the maximum length password you're allowed. Just choose the first prime smaller than 2^256, one of say, 1024 multipliers, and modular mu

symmetry group

1999-07-23 Thread staym
There's no real concept of "distance" between elements of a group, and yet if you were to consider operations on, say, a rubix cube, it's obvious that some states are further from "solved" than others. That's because we can't "do" a general operation on the rubix cube in just one step; we have to

more than linear algebra?

1999-08-04 Thread staym
I have a set of unit vectors, but don't know their coordinates, or even the dimension of the space they span. I'm given the angle between each pair of vectors in units of some unknown "unit angle". I'd like to find the smallest dimension into which the set fits, as well as the range of values th

decorellation

1999-08-21 Thread staym
What does decorellation do? -- Mike Stay Cryptographer / Programmer AccessData Corp. mailto:[EMAIL PROTECTED]

restance to linear cryptanalysis

1999-08-21 Thread staym
With N key bits, there are 2^N different subsets of key bits. If you fix a plaintext, then each ciphertext bit is an N-to-1 boolean function. Is there any way to show that there is no subset of key bits whose parity is a good linear approximation of the function? -- Mike Stay Cryptographer / Pr

ecc question

1999-08-23 Thread staym
The ecc discrete log problem is given points A and B, find integer x such that xA=B if it exists. I assume that most crypto implementations of ecc use finite fields; in a finite field can you assume that x exists? -- Mike Stay Cryptographer / Programmer AccessData Corp. mailto:[EMAIL PROTECTED]

Rijndael's s-box

1999-08-25 Thread staym
There are several (five, that I've found) linear approximations of the *entire* S-box that hold with probability 7/256. Is that useful? -- Mike Stay Programmer / Crypto guy AccessData Corp. mailto:[EMAIL PROTECTED]

How many ways can one form an abelian group with N symbols?

1999-09-13 Thread staym
How many ways can one form an abelian group with N symbols? Note that I'm not asking how many groups there are of order N, since isomorphisms count separately, and it's not just the number of abelian groups times the number of permutations of the symbols, since the identity element isn't preserve

Re: Why did White House change its mind on crypto?

1999-09-17 Thread staym
Generally, they'll just be recovering passwords. Then it's easy to show that the plaintext matches the ciphertext. They don't have to reveal where the password came from, of course, merely that it decrypts the file. >If you can not reveal how you descramble it, doesn't that mean you >can't be

Re: Why did White House change its mind on crypto?

1999-09-17 Thread staym
Our company works with the FBI a lot. We provide the software they actually use to recover passwords. The majority of software out there uses access-denial: the encryption / ofuscation doesn't depend on the password. But to be acceptable in court, you have to prove that you didn't change a si

RSA

1999-09-17 Thread staym
I seem to recall someone saying that if you can get one bit of an RSA message, you can get the whole thing. Or maybe it was the key. Does anyone know where I might be able to find out more about this? -- Mike Stay Programmer / Crypto guy AccessData Corp. mailto:[EMAIL PROTECTED]

Re: The well-travelled packet

1999-09-25 Thread staym
I know they got one guy here in the States for sending a death threat across state boundaries (went over the internet out of state, then back in again). -- Mike Stay Programmer / Crypto guy AccessData Corp. mailto:[EMAIL PROTECTED]

Re: "unbreakable code?" with cash prizes

1999-10-12 Thread staym
I wrote the author of the challenge. He responded (quoted with permission) If you had received my previous email, with accompnaying URL (below), you would know how I encrypted this message and have my source code. > Will you provide source to the encryption code? Yes. See: http://www.w

Re: "unbreakable code?" with cash prizes

1999-10-12 Thread staym
I guess the question is, how much entropy is in your average compressed jpeg? -- Mike Stay Programmer / Crypto guy AccessData Corp. mailto:[EMAIL PROTECTED]

More quantum crypto

1999-10-18 Thread staym
On the Los Alamos Preprint site (xxx.lanl.gov) today: quant-ph/9910072 [abs, src, ps, other] : Title: Quantum secure identification using entanglement and catalysis Authors: Howard N. Barnum Comments: 7 pages; no figures I consider the use of entanglement between two parties to enable one to au

size of linear function space

1999-10-18 Thread staym
Consider functions of one variable whose domain and range are both {0,1,2,...,n-1}. There are n^n possible functions. How many of these are linear [i.e. F(a+b) = F(a) + F(b) + c, where c is the same for all a,b (if it were different, that would be trivial)]? For any one definition of +, there w

Microsoft distributes strong crypto to the masses

1999-10-20 Thread staym
Before OSR2, Windows PWL (cached password database) files reused the same RC4 stream for known plaintext and the cached passwords. Someone exploited this and published code. Apparently, MS has fixed the problem. PWL files under '95/OSR2 and '98 are protected with a single RC4 stream whose 128-b

Re: Microsoft distributes strong crypto to the masses

1999-10-20 Thread staym
I wrote: >Resources and passwords don't have to conform to anything; they're >arbitrary binary strings. The PWL file is a database of (type,name,resource) triplets; it can store up to 255 of these; I don't know how long each can be. -- Mike Stay Programmer / Crypto guy AccessData Corp. mailto:[E

linear cryptanalysis

1999-11-01 Thread staym
Does resistance to linear cryptanalysis mean that there is *no* linear approximation to the entire function with a large enough bias to exploit? -- Mike Stay Programmer / Crypto guy AccessData Corp. mailto:[EMAIL PROTECTED]

Re: HOWTO: Encryption on local LAN

1999-01-02 Thread staym
Also check out RedCreek Ravlin. "Michael Enk" <[EMAIL PROTECTED]> on 11/03/99 05:11:25 AM To: [EMAIL PROTECTED], [EMAIL PROTECTED] cc:(bcc: Christopher St Clair/OH/BANCONE) Subject: HOWTO: Encryption on local LAN Hi all, I have run into a bit of a problem. I am looking for a 'bl

Form of prime modulus for ElGamal

1999-11-12 Thread staym
Are there any kinds of primes I should avoid when picking a modulus for an ElGamal system? -- Mike Stay Programmer / Crypto guy AccessData Corp. mailto:[EMAIL PROTECTED]

rate of finding collisions

1999-12-01 Thread staym
On average, you'll find one N-bit collision after looking at O(2^(N/2)) random N-bit strings; how long does it take, on average, to find k collisions? O(k*2^(N/2))? -- Mike Stay Programmer / Crypto guy AccessData Corp. mailto:[EMAIL PROTECTED]

Re: rate of finding collisions

1999-12-01 Thread staym
I wrote: >O(k*2^(N/2))? It has to be faster than that by a counting argument. How much faster? -- Mike Stay Programmer / Crypto guy AccessData Corp. mailto:[EMAIL PROTECTED]

small authenticator

2000-01-19 Thread staym
I've got something with around 100 bytes of ram and an 8-bit multiply. Is there an authentication mechanism that can fit in this? -- Mike Stay Programmer / Crypto guy AccessData Corp. mailto:[EMAIL PROTECTED]

Re: small authenticator

2000-01-19 Thread staym
Several people have suggested using a MAC; my problem is that the opponent can reverse-engineer the chip and find the key. I was hoping to give the chips a public key and have it encrypt a challenge that I'll respond to. On my side, I'd need to prevent chosen-cipehrtext attacks. -- Mike Stay Pr

Re: The problem with Steganography

2000-01-26 Thread staym
Eric wrote: >No matter how well concealed (stego)or how well encrypted (crypto), >does he have any way of notifying his friends that they should >look here without alerting the enemy of his attempts to communicate? It's the same challenge as secret key vs. public key. If you have no prior arrang

Re: Encrypting folders in Win95/98

2000-03-13 Thread staym
PGPDisk? Also BestCrypt lets you write your own encryption module. >Does anybody know any good Win95/98 utility providing connectoids seen >by the user >as folders, so that any file moved to and from them get >automatically encrypted and decrypted? Something like Encrypted Magic >Folders by PC

Re: PKZIP: any attacks other than Kocher plain text?

2000-05-08 Thread staym
You can get away with as few as seven bytes of plaintext and 2^40 work if you have other files in the archive. Five of the thirteen bytes are only used for filtering, so if you have other files you can use the password check bytes instead of known plaintext bytes. Also, in kocher's attack, you c

Unconditional quantum bit commitment

2000-06-28 Thread staym
Today on http://xxx.lanl.gov/list/quant-ph/new quant-ph/0006109 [abs, src, ps, other] : Title: Unconditionally Secure Quantum Bit Commitment Is Possible Authors: Horace P. Yuen Comments: 12 pages Bit commitment involves the submission of evidence from one party to another s