log☇︎
175 entries in 0.355s
asciilifeform: (as discussed in the 'g' thread. you ask for kakobrekla-style token, and decrypt a symmetric key)
asciilifeform: which is the case for virtually all symmetric ciphers
mircea_popescu: that's why they're symmetric.
mircea_popescu: ben_vulpes all symmetric ciphers share the key.
mircea_popescu: as we agreed, cramer-shoup with shared key is acceptable symmetric cipher.
mircea_popescu: http://log.bitcoin-assets.com/?date=04-02-2016#1396208 << how is this a symmetric cipher lol. it's just a clunky overimplementation of blowfish or w/e it is gpg uses. ☝︎
ascii_butugychag: http://www.loper-os.org/?p=1323 << obligatory oldie, from my www; i will note that most of the proprietary ciphers are known to be symmetric.
ascii_butugychag: i always found it interesting that, after all of the $maxint spent on both sides of the ocean on symmetric crypto (see maslennikov's b00k, from the l0gz, say) we have - publicly - no more provably-hard symmetric crypto than a hundred years ago
mircea_popescu: isn't any "rsa-like" symmetric cypher basically an immature or partial implementation of
mircea_popescu: this is actually a good call for wisdoms. what's the #b-a symmetric cypher ?
mircea_popescu: there's no good symmetric cypher.
ascii_butugychag: symmetric plox
ascii_butugychag: anybody got a favourite symmetric cipher, incidentally ? ☟︎
ascii_butugychag: this gets fed into a small proggy on your box, which now knows where to connect, and what the symmetric cipher key is
asciilifeform: PeterL: stego is a symmetric thing
v_diddy: mircea_popescu: re "powerful men behaving badly" is this symmetric with "powerful women behaving badly"?
ascii_field: so he modifies assbot so that the next time mircea_popescu is given otp token, it is actually carrying the rsa-enciphered symmetric key from $message
ascii_field: you are decrypting a symmetric key
ascii_field: (i.e., we ~think~ we are decrypting garbage, but who knows what it is. perhaps nsa killed kakobrekla and the next auth token is actually using the symmetric key header from your last transmission to the satellite !!)
asciilifeform: and symmetric crypto is also not made use of.
mircea_popescu: punkman currently a symmetric session key is rsa encrypted.
asciilifeform: (goes without saying that it is only good for symmetric crypto)
decimation: http://www.eecis.udel.edu/~mills/onwire.html The symmetric modes operate using a sequence of rounds, each consisting of a transmit packet followed by a receive packet, but either of both of these packets could be lost. A round is correct if both packets are correctly received. In order to verify correctness of the protocol, it is necessary to prove a liveness assertion; that is, the protocol always yields a correct round even if after
decimation: as in, a symmetric pair for time transmission?
davout: if the symmetric cipher security isn't based on the intractability of factoring large numbers you can't really tell which one will be broken before the other
davout: isn't aes the symmetric cipher used by GPG?
mircea_popescu: fore the other, at that level it would doubtlessly be cheaper to crack the symmetric cypher involved
ascii_field: and hence the location of key, and any symmetric decrypt password to it, -is- the brainwallet
asciilifeform: in late '80s - early '90s, laughably weak symmetric crypto (even rotor machines !) were still in use worldwide, for instance
ascii_modem: mircea_popescu: you can download the product & try dividing by your symmetric things now! no need to wait for me
hanbot: 5.1 and 7.1 better example of repeating, 101 could be just like 100000100011. 11/101/111 are all symmetric to so you don't know.
mircea_popescu: do they do the "rsa encryption of an aes symmetric key" thing ?
ben_vulpes: symmetric in my brain.
asciilifeform: lol re: usg spending $maxint to extract apple symmetric key from cpu
gabriel_laddel: What Al would like to test is pretty simple. Is gravity mirror-symmetric? If it is, then you can drop two stereoisomers in a vacuum, and they'll fall at the same rate. We don't know that this is the case, and the universe actually violates mirror-symmetry on many scales. Perhaps a violation will be observable.
asciilifeform: machine decrypts this. now both sides have a symmetric key
asciilifeform: who in turn generates a block cipher (symmetric) key for the occasion
ben_vulpes: you can have a symmetric wing
mircea_popescu: symmetric cyphers are also socialist
mircea_popescu: anyway, re the thinkers : i'm pretty sure the symmetric cypher is currently the weakest link in our entire crypto stack.
bounce: even with the shorter key the symmetric cipher is thought to be stronger than the asymmetric cipher
mircea_popescu: for one thing, dsa/elgamal uses dsa key for signing not encryption. for the other, the symmetric block cypher is not so very large anyway/
mircea_popescu: anyway, thgis is more an aesthetic consideratyion. ditching symmetric cyphers is the more substantial thing, and since a reimplementation happenes, might as well add aesthetics.
mircea_popescu: you know, thinking about this, i think i actyally want pgp reimplemented. usgavin's speshul maths about how things improve make me realise that having a pure rsa based code rather than the current encode a symmetric chypher method is perhaps feasible.
decimation: heh http://www.qnx.com/developers/docs/6.3.0SP3/neutrino/sys_arch/smp.html#SMP " Symmetric multiprocessing addresses the issue by running only one copy of Neutrino on all of the system's CPUs."
mike_c: yeah but they didn't have symmetric two way pegs.
decimation: is it symmetric?
teward: mircea_popescu, sure... if you want to pay thousands a month for a 1gig symmetric pipe, or $850 a month for a 100meg symmetric pipe
mircea_popescu: "I leave aside the confusion absence of evidence/evidence of absence--and the misunderstanding of the very notion of "empiricism". It is a fact that in the real world of our daily decision-making 1) we do not have much evidence of most relevant things, yet we need to take action; 2) in most situations, "true/false" is never symmetric (one side is more harmful than the other), so the burden of evidence is one-sided. Which
assbot: [Weekly Dividends] Symmetric Step Trading
mircea_popescu: davout> it encrypts the message symetrically IIRC, and only repeats the symmetric key for each recipient << this is correct
benkay: <davout> it encrypts the message symetrically IIRC, and only repeats the symmetric key for each recipient // joecool that's the deal right there
davout: it encrypts the message symetrically IIRC, and only repeats the symmetric key for each recipient
mircea_popescu: fluffypony https://bitcointa.lk/threads/pre-ipo-symmetric-step-trading.292080/page-4#post-6318694 make that 2011 to really bother him. i don't think ANYONE from 2011 or prior isn't in the wot tbh.
mircea_popescu: ;;later tell namworld https://bitcointa.lk/threads/pre-ipo-symmetric-step-trading.292080/page-4#post-6205001 we lolled.
mircea_popescu: you can get it symmetric, but it's not really useful or needed for most end users.
bounce: glass? symmetric?
Namworld: Wait, what? That Symmetric Step thread mentions me.
mircea_popescu: "The two Symmetric Step partners have been "lurkers" on this forum since mid 2013. "
ozbot: [IPO Launch April 16 2014] Symmetric Step Trading
mircea_popescu: if someone is going to break your gpg encryption tehy will attack the symmetric key not the 4kb rsa
asciilifeform: mircea_popescu: cut&paste in cad proggy will do that. symmetric.
mircea_popescu: o i sayd symmetric sorry. my bad.
mircea_popescu: do you understand symmetric key cryptography ?
ninjashogun: are you exchanging a symmetric password with someone over this channel? ;-)
asciilifeform: cads: idea probably was, you'd like to block-cipher the blob, but don't want to send a symmetric key (however contained) into the field.
mircea_popescu: after about 1kb or so worth of key, it's more efficient to try and crack the symmetric cypher anyway
gecko_x2: you combine a noiste aware tcp/ip interfac with strong symmetric OTP crypto
davout: answer is "store it encrypted on the app server, ancrypt and decrypt it client side with symmetric crypto using the user's password"
cads: truff1es: also, it occurs to me that leaving a chat room is not the same as ignoring everyone in that chat room. Information is not symmetric, in the latter case.
Skarr: I'm guessing we now have our range, 172-194. And we'll see a symmetric wedge develop within that, centered around the 183 price point, while another day of consolidation around this new price point occurs. Then the next leg-up.
mircea_popescu: "Liquidity requires symmetric information, which is easiest to achieve when everyone is ignorant. This determines the design of many securities, including the design of debt and securitization"
mod6: iz: so in the mean time, I have a AES256 class that I wrote that will utilize AES and enc/dec the key... at least that way, its protected by the symmetric key
mod6: i have a screen now where the user goes in and sets the private key for the KeyStore, etc. but now I think I'm just gonna make that be the symmetric key for like AES or something
mod6: so... im kinda thinking, this is way to much effort for just a first release, can I not just use a symmetric key algo to enc the privkey on the local filestore?