log☇︎
168200+ entries in 0.145s
erlehmann: on train now, later
mircea_popescu: watch at least until he says turnip
erlehmann: maybe i am not clear enough: i did not get to hold a talk so i talked to random c developers for fun.
erlehmann: no, they rejected my entry
mircea_popescu: did they pay you to do a talk.
erlehmann: mircea_popescu like, ticket? it was camping, mostly
erlehmann: one lulzy consequence is that a lot of software might have been released with sublty wrong header files included
mircea_popescu: erlehmann was this paid ?
erlehmann: mircea_popescu i wanted to give a talk about non-existence dependencies at SHA 2017 and it was rejected with “provide a 5min lightning talk on problem instead”. problem: 5min are enough to understand the problem, not why you are having it or what follows from it.
mircea_popescu: but afaik keccak isn't that fix-space-able either. ☟︎
mircea_popescu: asciilifeform i guess when he comes back from the mpfhf reverser ima make him do a keccak impl that ACTUALLY does the any-output thing. afaik they're all 32/64byte
asciilifeform: sponge goes from any-input to desired-width-out
mircea_popescu: erlehmann which talk is this ?
asciilifeform: mircea_popescu: nope that'd be classisal hashes
erlehmann: 4. yes the effect matters. we can patch make, though
erlehmann: 3. yes, this is not detectable, but the effect is negligible
mircea_popescu: i thought it's any input fixed output
erlehmann: 2. yes, this might be a problem for some, but it never happens to me
erlehmann: 1. this is not a problem at all in my process
mircea_popescu: asciilifeform most importantly, do we ACTUALLY want to do something pgp-retarded like say R.len = 200 bytes, repeat the last 50 for a 250 byte total then use the repeat to make sure you decrypted correctly ?
erlehmann: because the reaction of most people to it is
erlehmann: mainly i realized why my talk to the conference was rejected
erlehmann: mircea_popescu one person hallucinated having seen the elusive djb redo c code that ultimately did not exist. another person was a release manager and made sure the problem does not exist. a third person wrote a cmake thingy longer than my own redo implementation. a freebsd developer confirmed the problem exists.
mircea_popescu: how's that sound ?
mircea_popescu: to encrypt : take plaintext message M, no longer than 250 bytes, and zero-pad it to 250 bytes. take pile of random bits R 250 bytes long. calculate X = M xor R. calculate Y = R xor MPFHF(X) set for R.len = 250 bytes. RSA the 500 byte pile of X || Y. done. to decrypt : de-RSA the 500 byte pile. cut it in two halves. calculate R = Y xor X. calculate M as X xor R. done. ☟︎
erlehmann: indeed, one part of the solution is to return to earth
a111: Logged on 2014-11-26 01:11 asciilifeform: 'I’d like to see one expression coined by the poker writer Matt Matros become common parlance, since it applies far more widely than only to poker. An “alien problem” means some problem that might be fun, interesting and educational to analyze, and it would be really important to know the solution if you ever found yourself in that situation, but the point is that you shouldn't even be having that problem in the first pl
asciilifeform: http://btcbase.org/log/2014-11-26#934853 << thread ☝︎
erlehmann: asciilifeform the goal of the game is to make dev aware of context being insane
asciilifeform: erlehmann: you seem to be fixated on a problem that simply doesn't exist in sane contexts
erlehmann: something involving a goedelized perl script that builds all build rules that don't build themselves. drugs were probably involved.
erlehmann: the solution turned out to be a non-solution btw
erlehmann: asciilifeform correct. the talk begins with me mentioning non-existence dependencies and ends with the recipient either having a solution (one guy), being aware of the problem already (i counted two) or being unaware of it but being aware that their software is a lie.
mircea_popescu: erlehmann it's a pile of patches. how the compiler optimizes the rebuilding is irrelevant ; if you change one file it can rebuild the whole thing or not ; but v still only changes the one file and still doesn't have the problem.
asciilifeform: erlehmann: the building-clean thing is sanity. we had this thread. if your program is 'too big to always build clean', IT IS TOO BIG
mircea_popescu: erlehmann that's not what v does.
asciilifeform: erlehmann: the problem you describe is absent in v
erlehmann: they are only arguably the most common one
erlehmann: asciilifeform C header files are only one instance of such non-existence dependencies where existing of a thingy invalidates the assumptions that went into building another thingy.
BingoBoingo: mircea_popescu: Looking like exactly that
asciilifeform: erlehmann: the problem however is not where you seem to put it
mircea_popescu: letting him "figure for self" at this juncture is unsanitary.
erlehmann: asciilifeform that is one possible answer to the think. the thing that starts the triggering is usually a combination of said devs using make and realizing that this is, indeed, a problem.
mircea_popescu: asciilifeform anyway, let's sit down and make something sane for this guy. peterl i mean. what's his message supposed to be like ?
asciilifeform: no third.
asciilifeform: systems are to be fixed - i.e. brought into conformance with vtronics -- or discarded.
asciilifeform: they correspond to a vgraph with contradictory inputs.
erlehmann: if A or B start to exist, the target also needs to be rebuilt. that is a non-existence dependency.
erlehmann: if C changes, the target needs to be rebuilt. that is a dependency.
asciilifeform: flush the toilet.
asciilifeform: clean the fucking chalkboard
asciilifeform: didn't we do the STOP FUCKING PARTIALMAKING thread ?
asciilifeform: granted, but when would this come into play ?
mircea_popescu: asciilifeform that for x to work, y has to not exist.
erlehmann: 2. look on while almost all of them develop the exactiy same train of thoughts (including fixing make, which is impossible for this kind of program)
erlehmann: 1. mention non-existence dependencies to people who know C and/or C++
asciilifeform: you can do more or less whatever variations on whichever theme, you feel like, all it costs is a few extra chars in pubkey
asciilifeform: incidentally you get best attributes of both if you harness them as i described, via otpxor
mircea_popescu: otherwise why implement a ptron rather than simply a rsatron.
mircea_popescu: but in my own mind the "well alf is making P" pretty much was "he's walking to path to both cs and rsa impls to the furthest node"
mircea_popescu: afaik pretty much the only candidate besides rsa itself.
asciilifeform: i don't know of any hard, tangible reason to avoid it.
mircea_popescu: i thought there's consensus re offering c-s in teh tmsr cryptotron
mircea_popescu: pubkey crypto dunb enter into it, this is a discussion of signature hashing (digests, really) schemes.
asciilifeform: ( my distaste for it comes largely from it not being rsa, and from a suspicion that enemy has a partial pill against discrete logarithm problem , given that dsa was based on same )
mircea_popescu: the statement is that if pss is used atop rsa, then baring poor implementation a forgery is going to cost more than what reversing rsa costs.
asciilifeform: now if you want a pubkeycrypto where this proof actually exists, i know of exactly one : cramer-shoup
mircea_popescu: so what is teh fail ?
asciilifeform: ''When RSA is the underlying primitive, something even more is known: that the ability to forge with resources R in an attack which does not exploit some structural characteristic of the MGF implies the ability to invert RSA on random strings using computational resources only slightly greater than R.''
mircea_popescu: what is this, bayesian proof evaluation ?
mircea_popescu: iirc there is a proof it is as secure as rsa.
asciilifeform: mircea_popescu: i looked at the pss thing, seems like simply yet another obfuscatorily-complex nsaological artifact
a111: Logged on 2016-05-21 23:31 shinohai: https://steemit.com/girlsgonesteem-nsfw/@steempower/welcome-to-girls-gone-steem#comments <<< the logo even looks like a turd. "steem"
mircea_popescu: but, it given, it's no wonder all cars migrating to being the same engine in different plastifications.
mircea_popescu: it's incomprehensible to me, how this "i moved from a forum to a ... forum" thing works in the public's mind.
BingoBoingo: Not really made a blog. Started making posts on platform that it seems some other folks made.
BingoBoingo: Ah, that may be it?
a111: Logged on 2017-08-01 23:43 mircea_popescu: i suspect steemit is a sort of how did they call that alt-disqus/alt-github "let us steal your content" thing ?
mircea_popescu: (believe it or not, the 18 byte lulz is actually specificed as such, https://archive.is/QYKu5#selection-3121.6-3121.789 ; worth a read, has null IV and all sorta gems)
a111: Logged on 2017-08-09 18:37 mircea_popescu: xor the bytes ?
mircea_popescu: (ftr, the way pgp does it is that it repeats two bytes of a more or less random block of 16 bytes, and then checks if they came out the same. this is in fact WORSE than http://btcbase.org/log/2017-08-09#1696023 but then again contemporary applied cryptography is a very low effort, low quality field). ☝︎
mircea_popescu: http://grouper.ieee.org/groups/1363/P1363a/contributions/pss-submission.pdf for the day of the pdfs.
mircea_popescu: and incidentally, pss should prolly be in the final tmsr-rsatron huh.
mircea_popescu: so you want to take a message m, add that many random bits to it, and then add twice that many bits as a hash of the pile, thereby using 25% of the space for the plaintext ?
asciilifeform: ( if message dun match the prescribed structure -> forgery )
asciilifeform: whole point of the M+H(M) or no-go combo is to prevent forgery.
mircea_popescu: trying to stuff a mac or something in there will make the bondogle regret the days of the aes/rsa combo.
mircea_popescu: asciilifeform yes, well, everything has problems. but there's a difference between using a crc as hash and using a crc as checksum ; and using say sawed-barrel keccak (take first or last x bytes, whatever) isn't all that good because it's really not designed for fragment behaviour like that, nor was such studied
deedbot: http://phuctor.nosuchlabs.com/gpgkey/FB227B026FA94ABC18FD0A71ADB21D83E8E43BBF14F2DEBFE85F490FFF3627B9 << Recent Phuctorings. - Phuctored: 1618...0213 divides RSA Moduli belonging to '82.214.135.102 (ssh-rsa key from 82.214.135.102 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (82-214-135-102.itsa.net.pl. PL)
deedbot: http://phuctor.nosuchlabs.com/gpgkey/FB227B026FA94ABC18FD0A71ADB21D83E8E43BBF14F2DEBFE85F490FFF3627B9 << Recent Phuctorings. - Phuctored: 1578...0979 divides RSA Moduli belonging to '82.214.135.102 (ssh-rsa key from 82.214.135.102 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (82-214-135-102.itsa.net.pl. PL)
PeterL looks, finds a .py standar lib function for this: binascii.crc32
PeterL: asciilifeform: ^ what would be the downside of using crc for this?
BingoBoingo: mod6: ty fxd
asciilifeform: ( if anyone recalls my sageprobe crack ? that was as simple as it was because the thing used crc as hash... )
asciilifeform: you wouldn't want to use a checksum ( e.g. crc ) for decryptable-legit vs random rubbish distinguisher
mircea_popescu: and with this, PeterL finds himself exposed to galois fields, polynomial division, and the rest of the "easy to implement and straightforward" jewels.
mircea_popescu: (that =4char thing at the end of the messages)
asciilifeform: lol that's probably the worst conceivable
mircea_popescu: xor the bytes ? ☟︎
PeterL: I do find it annoying that long messages get split, but I guess it is not the end of the world or anything