log☇︎
147600+ entries in 0.713s
asciilifeform: ( other than the basic cost of using ffa )
asciilifeform: the only thing you can prove is that it dun cost you nuffin.
mircea_popescu: but this is nothing i can prove in any degree of particuliar.
asciilifeform: aha, and the wider, the better.
mircea_popescu: asciilifeform no, i know. from the pov of rsa-being-attacked, it's probably better to have non-standard exponent than "everyone uses 65537"
mircea_popescu: (kinda why historically these were "secrets", from eleusis to scientology. the less material, the easier the complexity load)
asciilifeform: mircea_popescu: in ffa world, you don't lose anything by using a W-bit prime for the public exponent.
mircea_popescu: the advantage of small batshit cults is that there's not enough of them to discover where they self-contradict.
asciilifeform: mircea_popescu: cables also work well in another context: cuckolding. if you know what yer doing you can ride signal on top of , e.g., cable tv lines, or whatever derperies of the landscape
mircea_popescu: asciilifeform i have not yet managed to find the 1 ton of earthworms required to put through the blenders so as to extract the definition of any of these nuts' terms.
mircea_popescu: the rationale is that there ~might~ be some approaches based on pre-established exponents. this is vague, but still, why magic number.
asciilifeform: mircea_popescu: it's spamology tho, not broken modem, generally there's some consistency neh
asciilifeform: and entirely missed the line in the orig article stating that this was not so...
asciilifeform: because this was in the tentative 'standard' as a variant
mircea_popescu: they're words they use.
diana_coman: oh my; thank you apeloyee
a111: Logged on 2017-11-01 18:18 asciilifeform: they are imho an intrinsically usgistic item -- costly, fragile, vulnerable, conspicuous.
mircea_popescu: http://btcbase.org/log/2017-11-01#1731778 << cable comms work well in some situations, with spools and runners as deployed in ww2. yes cable can be cut -- by the time it is you're gone anyway. ☝︎
mircea_popescu: on a side note, if you ever wondered whence the "transhumanist" etc-rationalistrs come from, check out this little gem teh loney uncovered in my absence : http://trilema.com/2010/calea-spre-idiotenie/#comment-123389
mircea_popescu: whole fucking point of intelligence is not to miss. ☟︎
asciilifeform: i nominate this d00d to replace me when i'm killed.
asciilifeform: defo apeloyee has better reading comprehension. i entirely missed the line where diana_coman clearly wrote, she used 65537
apeloyee: decryption is forced to do full-size exponentiation
mircea_popescu: !!rate apeloyee 2 might be the smartest guy here, actually.
apeloyee: it's _encryption_ that's unreasonably fast, due to using 65537 as exponent
asciilifeform: we weren't comparing gpgmpi to ffa ; but gpg.publicmodexp vs gpg.privatemodexp
asciilifeform: apeloyee: why would this make crt a 100x ~slower~ op , instead of 4x faster
apeloyee: asciilifeform: don't be silly, the discrepancy is due to using low public exponent
diana_coman: but in a few hours I'll have more uninterrupted time on my hands and I'll be able to go a bit deeper into it
diana_coman: mircea_popescu, so far the ~only part iffy is perhaps choice of timer basically
mircea_popescu: did you two run into a fucking portability issue of all things ?
asciilifeform: prolly time for gprof.
BingoBoingo: mircea_popescu: Ah, ty.
BingoBoingo: danielpbarron: ty I'll get to your message when physical plant allows
diana_coman: so, changed those 2 lines to pkey.n = mpi_copy(skey->n) and pkey.e = mpi_copy(skey->e) ; correct?
mircea_popescu: don't worry about it, trial and error, i'll ask questions until i'm out.
a111: Logged on 2017-11-01 17:54 BingoBoingo: Rewrite in works http://btcbase.org/log/2017-11-01#1731666 << No good reason. http://btcbase.org/log/2017-11-01#1731667 << No, attempting to list the advance as a debt by recreating necessary TMSR accounting out of log fragments http://btcbase.org/log/2017-11-01#1731682 << Will try not juggling network topology in forebrain when rewriting http://btcbase.org/log/2017-11-01#1731687 << There will be rug
asciilifeform: i see no obvious explanation for the oddity...
asciilifeform: i am more than a little bit surprised that this didn't bomb
diana_coman: asciilifeform, possibly I managed to screw it up in an even more basic way; here's the test function itself (this one gets called repeatedly for each key and each message)
asciilifeform: this is relatively insensitive to clock precision
asciilifeform: diana_coman: to rule out timer artifacts, can make item that, e.g., carries out 1,000 decrypts, timed with ordinary unix time cmd; then same where 1,000 encrypts
asciilifeform: diana_coman: quite a puzzler then: all of the most obvious mistakes, ruled out
jhvh1: danielpbarron: The operation succeeded.
danielpbarron: !~later tell BingoBoingo http://wotpaste.cascadianhacker.com/pastes/JDAx6/?raw=true
asciilifeform: diana_coman: aite. you will notice that public_rsa mallocs if it finds that the output buffer is same as input
diana_coman: asciilifeform, they are not; moreover the log shows clearly that encrypted stuff is different basically
asciilifeform: mod6: what diana_coman has is as close as fathomable to a virginal gpg where you can still make such a test
diana_coman: mod6, I couldn't find some that are directly comparable aka only the rsa ops as such
mod6: could then compare your results to that and see.
asciilifeform: diana_coman: is out1 perchance ever equal to out2 ?
diana_coman: hm, I'd be surprised if it gets wildly different results but that would be in itself something...interesting I guess
asciilifeform: but i still have the feeling that this is red herring
asciilifeform: http://man7.org/linux/man-pages/man2/clock_gettime.2.html theoretically
asciilifeform: on some boxes the output for short intervals is essentially random
diana_coman: from the post: Durations are given as CPU time in seconds, as reported by the clock() function (time.h) and calculated as ( (double) (end – start) ) / CLOCKS_PER_SEC where end is the value returned by clock() right before starting the RSA operation and end() is the value returned by clock() right after returning from the RSA operation
diana_coman: cpu clock ticks supposedly
diana_coman: c function from time.h
diana_coman: lemme just cut the fluff and then will post
diana_coman: the private thing basically holds anything anyway
diana_coman: ah, yes, that's just because the public key is a local var filled with the stuff from private
asciilifeform: i.e. both take ptr
mircea_popescu: now on the other hand, BABY crocodiles are universally fodder, birds eat them, fish eat them. huge infant mortality among crocs.
diana_coman: honestly, it's prolly faster to go through it again and then post it all and then take it from there
asciilifeform: because i see a public_rsa(out1, msg, &pkey) but then a secret_rsa( out2, out1, skey )
diana_coman: I even have those in a file too (i.e. each run, data, encrypted, decrypted
diana_coman: yes but after recording the time
asciilifeform: diana_coman: didja actually verify the decryptions' equality to the original input to encrypt ?
diana_coman: mircea_popescu,I know it to be uber-fast in water; dunno on land; either way, never saw one in its habitat
mircea_popescu: whereas the only sort of snake that'd bother it even conceivably is constrictor ; definitionally slow.
shinohai: In other "Encryption is for terrorists" news: http://archive.is/zx5WL
diana_coman: BingoBoingo, interesting; do alligators survive that though?
mircea_popescu: i know it doesn't look it, but, crocodile is one of the fastest predators ; apex predator everywhere it exists.
mircea_popescu: diana_coman crocodile is too fast for snake.
mircea_popescu: we're ~the first group with something to actually say.
a111: Logged on 2017-06-20 16:30 phf: scussions, but also any kind of attempt at crypto communication. there was nothing to say all along.
a111: Logged on 2017-11-01 16:21 asciilifeform: asciilifeform finds it more than a little puzzling how little of past 30y of cheap cpu, has been put to use in advancing illicit radio -- where is the dc-to-daylight cryptospreadspectrum pirate ? why idjits still on fixed frequencies, like it were 1930s today ?
diana_coman: asciilifeform, this is literally the bit counting : http://wotpaste.cascadianhacker.com/pastes/7G7XM/?raw=true
mircea_popescu: where was that part about "frozen diff bits of original lang"
asciilifeform: 'hamism' is a land apart from time, nearly.
asciilifeform: mircea_popescu: this tradition still lives, with the postcards
diana_coman: well yes, basically at rsa stage all I had to change was at generating keys aka source of random bits; the rest was just identifying the relevant parts and nothing more
mircea_popescu: it was a whole subculture, you'd try and talk to people then send postcards as a sort of early deedbotting
a111: Logged on 2017-11-01 16:07 trinque had a ham radio license once upon a time
asciilifeform: ( i dun see any invocations of secret_rsa in there )
mircea_popescu proceeds to logs.
asciilifeform: diana_coman: this looks almost virginal, the oddity is prolly in wherever you invoke it
diana_coman: asciilifeform, this is the ugly rsa.c used fwiw http://wotpaste.cascadianhacker.com/pastes/W42GS/?raw=true
asciilifeform: BingoBoingo: i dun have enough lsd to have conversation with a tape, lol
asciilifeform: diana_coman: do you have a disk access or some other oops in there, i wunder
BingoBoingo: asciilifeform: Have you tried talking to a few meters of audio track?
diana_coman: hm, public rsa uses mpi_powm; secret rsa uses crc; still though 100 fold
diana_coman: asciilifeform, yes, it does; hence my going "I have to comb this all way through again"
asciilifeform: BingoBoingo: still snarfing up ro lang; 'read head' worx, but training 'write head' on wrong side of planet not trivial
diana_coman: <asciilifeform> >> http://wotpaste.cascadianhacker.com/pastes/DrA3R/?raw=true << for n00bs : rsa-cum-crt , as seen in koch's gpg-1.4.10 <- aha, that's what I use, yes; anyways, will comb the thing again a bit later today and then get back with something concrete
BingoBoingo: Using the time waiting for people to people to clean up and condense physical plant here for greater portability
asciilifeform: BingoBoingo: how's the brazil thing going
a111: Logged on 2017-11-02 15:20 asciilifeform: also 1.1s seems like a pretty long time for a 4096b modexp on traditional mpi.
asciilifeform: also the expected speedup from crt is ~4-fold, not 100-fold...
asciilifeform: now perhaps diana_coman replaced the thing with mpi_powm( output, input, skey->d, skey->n ) or equiv. -- but then speed of encrypt and decrypt ought to be ~equal~