175 entries in 0.355s
mircea_popescu: as we agreed, cramer-shoup with shared key is acceptable
symmetric cipher.
ascii_butugychag: i always found it interesting that, after all of the $maxint spent on both sides of the ocean on
symmetric crypto (see maslennikov's b00k, from the l0gz, say) we have - publicly - no more provably-hard
symmetric crypto than a hundred years ago
mircea_popescu: isn't any "rsa-like"
symmetric cypher basically an immature or partial implementation of
mircea_popescu: this is actually a good call for wisdoms. what's the #b-a
symmetric cypher ?
ascii_butugychag: this gets fed into a small proggy on your box, which now knows where to connect, and what the
symmetric cipher key is
v_diddy: mircea_popescu: re "powerful men behaving badly" is this
symmetric with "powerful women behaving badly"?
ascii_field: so he modifies assbot so that the next time mircea_popescu is given otp token, it is actually carrying the rsa-enciphered
symmetric key from $message
ascii_field: (i.e., we ~think~ we are decrypting garbage, but who knows what it is. perhaps nsa killed kakobrekla and the next auth token is actually using the
symmetric key header from your last transmission to the satellite !!)
mircea_popescu: punkman currently a
symmetric session key is rsa encrypted.
decimation:
http://www.eecis.udel.edu/~mills/onwire.html The
symmetric modes operate using a sequence of rounds, each consisting of a transmit packet followed by a receive packet, but either of both of these packets could be lost. A round is correct if both packets are correctly received. In order to verify correctness of the protocol, it is necessary to prove a liveness assertion; that is, the protocol always yields a correct round even if after
decimation: as in, a
symmetric pair for time transmission?
davout: if the
symmetric cipher security isn't based on the intractability of factoring large numbers you can't really tell which one will be broken before the other
davout: isn't aes the
symmetric cipher used by GPG?
mircea_popescu: fore the other, at that level it would doubtlessly be cheaper to crack the
symmetric cypher involved
ascii_field: and hence the location of key, and any
symmetric decrypt password to it, -is- the brainwallet
ascii_modem: mircea_popescu: you can download the product & try dividing by your
symmetric things now! no need to wait for me
hanbot: 5.1 and 7.1 better example of repeating, 101 could be just like 100000100011. 11/101/111 are all
symmetric to so you don't know.
mircea_popescu: do they do the "rsa encryption of an aes
symmetric key" thing ?
gabriel_laddel: What Al would like to test is pretty simple. Is gravity mirror-
symmetric? If it is, then you can drop two stereoisomers in a vacuum, and they'll fall at the same rate. We don't know that this is the case, and the universe actually violates mirror-symmetry on many scales. Perhaps a violation will be observable.
mircea_popescu: anyway, re the thinkers : i'm pretty sure the
symmetric cypher is currently the weakest link in our entire crypto stack.
bounce: even with the shorter key the
symmetric cipher is thought to be stronger than the asymmetric cipher
mircea_popescu: for one thing, dsa/elgamal uses dsa key for signing not encryption. for the other, the
symmetric block cypher is not so very large anyway/
mircea_popescu: anyway, thgis is more an aesthetic consideratyion. ditching
symmetric cyphers is the more substantial thing, and since a reimplementation happenes, might as well add aesthetics.
mircea_popescu: you know, thinking about this, i think i actyally want pgp reimplemented. usgavin's speshul maths about how things improve make me realise that having a pure rsa based code rather than the current encode a
symmetric chypher method is perhaps feasible.
mike_c: yeah but they didn't have
symmetric two way pegs.
teward: mircea_popescu, sure... if you want to pay thousands a month for a 1gig
symmetric pipe, or $850 a month for a 100meg
symmetric pipe
mircea_popescu: "I leave aside the confusion absence of evidence/evidence of absence--and the misunderstanding of the very notion of "empiricism". It is a fact that in the real world of our daily decision-making 1) we do not have much evidence of most relevant things, yet we need to take action; 2) in most situations, "true/false" is never
symmetric (one side is more harmful than the other), so the burden of evidence is one-sided. Which
assbot: [Weekly Dividends]
Symmetric Step Trading
mircea_popescu: davout> it encrypts the message symetrically IIRC, and only repeats the
symmetric key for each recipient << this is correct
benkay: <davout> it encrypts the message symetrically IIRC, and only repeats the
symmetric key for each recipient // joecool that's the deal right there
davout: it encrypts the message symetrically IIRC, and only repeats the
symmetric key for each recipient
mircea_popescu: you can get it
symmetric, but it's not really useful or needed for most end users.
Namworld: Wait, what? That
Symmetric Step thread mentions me.
mircea_popescu: "The two
Symmetric Step partners have been "lurkers" on this forum since mid 2013. "
ozbot: [IPO Launch April 16 2014]
Symmetric Step Trading
mircea_popescu: if someone is going to break your gpg encryption tehy will attack the
symmetric key not the 4kb rsa
ninjashogun: are you exchanging a
symmetric password with someone over this channel? ;-)
mircea_popescu: after about 1kb or so worth of key, it's more efficient to try and crack the
symmetric cypher anyway
gecko_x2: you combine a noiste aware tcp/ip interfac with strong
symmetric OTP crypto
davout: answer is "store it encrypted on the app server, ancrypt and decrypt it client side with
symmetric crypto using the user's password"
cads: truff1es: also, it occurs to me that leaving a chat room is not the same as ignoring everyone in that chat room. Information is not
symmetric, in the latter case.
Skarr: I'm guessing we now have our range, 172-194. And we'll see a
symmetric wedge develop within that, centered around the 183 price point, while another day of consolidation around this new price point occurs. Then the next leg-up.
mircea_popescu: "Liquidity requires
symmetric information, which is easiest to achieve when everyone is ignorant. This determines the design of many securities, including the design of debt and securitization"
mod6: iz: so in the mean time, I have a AES256 class that I wrote that will utilize AES and enc/dec the key... at least that way, its protected by the
symmetric key
mod6: i have a screen now where the user goes in and sets the private key for the KeyStore, etc. but now I think I'm just gonna make that be the
symmetric key for like AES or something
mod6: so... im kinda thinking, this is way to much effort for just a first release, can I not just use a
symmetric key algo to enc the privkey on the local filestore?