274 entries in 0.493s
a111: Logged on 2018-10-30 21:36 asciilifeform: if all (a0..a31, b0..b31, ...) appear in the expansion, then
serpent aint actually braindamaged in the sense originally contemplated by asciilifeform .
mircea_popescu: i suppose that could be the backup alternative then : if we end up ditching
serpent, we use a rsa packet to move ~1.4kb of entropy for initializing the mt, and then use mt generated pads for a cipher.
mircea_popescu: as best i can tell -- the only options are either keep using
serpent or else use some kind of recursive hash otp
a111: Logged on 2018-10-29 19:39 asciilifeform: pretty handy proof , however, that the xor liquishit on the right hand side of those
serpent eqs, doesn't conserve entropy !
a111: Logged on 2018-10-26 17:04 mircea_popescu: in short, because this winding discussion risks overwhelming buffers, the salient points are a) that i'm not ready to go to war over
serpent, it's a meh-maybe item ; b) that building our spearheads around items we're not willing to die for may be how the converse of
http://btcbase.org/log-search?q=bitcoin+corrupts altogether.
a111: Logged on 2018-10-26 16:48 mircea_popescu: i am experimenting with
serpent, and yes it's borne of that ancient discussion of ours, but i'm nowhere near-ready to bake it into "this is tmsr secure disk"
mircea_popescu: i certainly see the point re "explore the space" ; and yes a
serpent implemented as both eulora workhorse and verilog is better studied than just former.
a111: Logged on 2018-10-26 16:08 asciilifeform: mircea_popescu: in re these lulz, at one point asciilifeform dug for 'anybody ever verilog-ified
serpent?' and found a stack of 'papers'. any src ? mno. but plenty of 'discussion' of supposed 'implementation', in the traditional nadia henninger style .
a111: Logged on 2018-10-26 16:08 asciilifeform: mircea_popescu: in re these lulz, at one point asciilifeform dug for 'anybody ever verilog-ified
serpent?' and found a stack of 'papers'. any src ? mno. but plenty of 'discussion' of supposed 'implementation', in the traditional nadia henninger style .
mircea_popescu: in short, because this winding discussion risks overwhelming buffers, the salient points are a) that i'm not ready to go to war over
serpent, it's a meh-maybe item ; b) that building our spearheads around items we're not willing to die for may be how the converse of
http://btcbase.org/log-search?q=bitcoin+corrupts altogether.
☟︎ mircea_popescu: but as it stands, seems sending people to bring me a
serpent hdd is not unlike sending people to bring be titted boars. why, can't use women ?
mircea_popescu: i am experimenting with
serpent, and yes it's borne of that ancient discussion of ours, but i'm nowhere near-ready to bake it into "this is tmsr secure disk"
☟︎ mircea_popescu: precisely why we put
serpent in there, so alf can go pig wild with his intricate rsaing :D
diana_coman: in other news from the smg comms front: the rsa pack/unpack turned a bit nastier than the nice
serpent because (of course!) of the C element; basically the rsa operations are in C (mpi mess) while the oaep is in Ada and the current eucrypt wrapper is fine but doing the ugly dance of C to Ada *and back*; my solution to this is to decree that there will be only ONE direction of calls namely from Ada to C (because Ada is the main, desired par
mircea_popescu: there's exactly nothing similar between rsa packet and
serpent packet. for the same money could ask to have busses and flour delivered in single container.
diana_coman: the tester does not pack them in rsa or
serpent proper so it's the "package" there rather than protocol message, I guess that might be confusing, I'll update
mircea_popescu: in ~principle~ eve can't even know what
serpent keys either server or client are using.
mircea_popescu: rsa-size and
serpent-size packets handled, rest discarded (and sources punished)
mircea_popescu: well, rsa packets are 4096 bits multiple ;
serpent packets are multiples of 128. rsa key exchange is 16kb fix.
mircea_popescu: asciilifeform the problem degrades gracefully : even if you do have shared rsa key, client sometimes wants to send
serpent keys (which go to rsa) and some other times wants to send plain cruft (goes to
serpent). so two sizes again
mircea_popescu: 1. server must be able to acquire RSA key of client. 2. the rsa key of client will have to go in a rsa message, because they presumably don't have
serpent keys agreed upon ; 3. the payload for one chunk of rsa key is 1960 bytes, fixed ; 4. the size of a key is 3.x such 1960 byte chunks, meaning 4 chunks. 5. the size of a 4 payload message is 16kb.
diana_coman: asciilifeform,
serpent payloads really; rsa is meant for single use when registering with server pretty much
a111: Logged on 2018-08-04 22:05 asciilifeform: ben_vulpes: iirc i proposed at one time an intermediate item on the way to proper gossipd ( '
serpent'-ciphered tunneler to connect coupla ircd instances to each other, and ditto for users ( get otp cookie a la deedbot, get a key that's good for 1 tcp connect ) but so far instead followed mircea_popescu's advice re not wasting sweat on such a thing, but pushing with ffa so as to get with what to gossipd.
mircea_popescu: (for the oursiders : it is the agreement in minigame boardroom that rsa helo packets from existing clients will be lowest priority, after 1.
serpent packets and 2. rsa helo packets from unknown clients. the idea is you keep your
serpent keys, and continue your "session" whenever, it's kind of a stateless session)\
diana_coman: uhm, dunno about that certainty there; maybe client doesn't want to keep
serpent keys between sessions for all I know
mircea_popescu: diana_coman, this is too fluid to fix in a comment, and i'd rather have it here than in #eulora. so : let's call eucrypt.
serpent X and eucrypt.RSA-OAEP R. now, 1. client wants to log in, R(hello) -> S[erver].
diana_coman: as to the serpent_self_test procedure - it can in principle even go away entirely as there is an equivalent test in the tests dir where tests should be anyway; the self_test is left mainly because it was in the original, but not crucial in any case
ave1: Then, smg_serpent self_test procedure needs to be function and raised removed
diana_coman: fwiw the footprint of eucrypt with default runtime is 215K (separate components: mpi 109K; bit_keccak 17K; keccak 42K; rsa 19K;
serpent 20K - 31K (depending on level of optimisation chosen)
diana_coman: ave1, I tried compiling eucrypt & components using your runtime: need support for Interfaces.C (used by keccak/oaep) and Ada.Unchecked_Conversion (used by
Serpent)
a111: Logged on 2018-02-23 14:52 mircea_popescu: speaking of which, what do you think diana_coman should eucrypt also include an elastic hashing algo on top of keccak and
serpent ?
mircea_popescu: speaking of which, what do you think diana_coman should eucrypt also include an elastic hashing algo on top of keccak and
serpent ?
☟︎ mircea_popescu: in other news : as work on eucrypt is winding down -- the whole item is just about complete, needs
serpent and we've decided to add an oaep-rsa wrapper (mostly as a pretext to do some ada-c interop testing), so roughly speaking by end of month it should actually be done -- we're moving on to shaping up the eulora client-server comms model. this will mostly be a design discussion, will take place in #eulora, prolly take up som