log☇︎
168400+ entries in 0.103s
PeterL: I will check in later once I am back at my computer with my key to verify this conversation has been with the real PeterL ☟︎
mircea_popescu: PeterL so if you feel like writing a mpfhf reverser... afaik nobody has to date.
mircea_popescu: this scheme is both slow and bulky. it is not likely useful for gossipd-style comms. it is certainly valuable for signing material, especially because rsa signature is much more padding-vulnerable than encryption ; and perhaps for some limited encryption work.
mircea_popescu: c (in that order), where R and S are produced by mpfhf(m') with R len set to c (bitness same as bitness of len(Pm). Pm will be the padded message sent to RSA. The recipient will have to undo mpfhf with known R and S to obtain m.
mircea_popescu: anyway, let it be said that there's nothing wrong with oaep as far as we know, but for the sake of argument a mpfhf based padding scheme would conceivably work like this : 1. given message m, of length l, generate r = random bits, of length l' up to l but not less than 256 bits. 2. compose m' = r + m + c (in that order), where c is l - l` (and its bitness is always same as the bitness of len(m')-256). 3. compose Pm = R + S + ☟︎
deedbot: http://trilema.com/2017/se-vende-joyeria-fina/ << Trilema - Se Vende Joyeria Fina
mircea_popescu: 3, generally. that, you never know. yeah.
mircea_popescu: i mean the bitsize ; it's not just that though, partially known secrets, low exponents etc all conspire to empwer the latice reduction.
PeterL: do you mean the bitsize of n and e, or the actual numbers?
PeterL: in " n / e^2 bits of entropy ", what are n and e, the key modulus and exponent?
PeterL: mircea_popescu linking to a pdf, what is the world coming to!?
mircea_popescu: (and they are http://www.di.ens.fr/~fouque/ens-rennes/coppersmith.pdf )
mircea_popescu: and since we're apparently doing rsa likbez : if r used in padding above contributes less than n / e^2 bits of entropy to the final, padded message, coppersmith has a few words to tell you.
mircea_popescu: PeterL terrible, terrible thing, which is why irl rsa is always padded.
mircea_popescu: (and, of course, for short messages ie shorter than n i can just compute the e-root).
PeterL: is that a good thing?
mircea_popescu: and upstream, to make clear what "semantic security" means : rsa is deterministic, if i wish to see if your "encrypted" string really was message m, all i have to do is encrypt m myself. if the results match i have cryptographic confirmation.
mircea_popescu: and besides, not muchly tested yet.
mircea_popescu: because hash and hash' are used to stretch/reduce the bitlength of their parameters, something like mpfhf (which permits arbitrary sized outputs/inputs) could work well ; but is also slow.
mircea_popescu: oaep works like this : given hash and hash' hash functions, calculate X as hash(m00) xor G(r) and Y = r xor hash'(X).
a111: Logged on 2017-02-14 19:19 asciilifeform: specifically, for every byte you intend to send, you instead send two: x, y. which you generate by obtaining rng byte r, and payload byte b, and x := b xor r, y := r
PeterL: this thing? http://btcbase.org/log/2017-02-14#1613906 ☝︎
mircea_popescu: basically it takes a random string, jumbles it with the original message, and spits out two halves. the hope with it is that it provides all-or-nothing security, in the sense that to recover any bit of the message you need to correctly process the entire pair of jumbled strings.
mircea_popescu: it's a sort of two-box permutation thing.
mircea_popescu: and THAT you then encrypt to key X and send ove.r
mircea_popescu: now, alf's scheme is probably valid padding, though it is very expensive. it works like so : to encrypt a message m to key X, you : a) generate two one-time keys, A and B. you encrypt some bits of m to A and some to B, randomly chosen. you pile together : the bits of m encrypted with A, the bits of m encrypted with B, the schedule of which is which, and the keys A and B into one large m'
PeterL: that is what we were trying to fix, no?
mircea_popescu: it's not useful in the field.
mircea_popescu: now : textbook rsa (the sort of thing you seem to be discussing, above) has no semantic security and on top of that is malleable.
mod6: meanwwhile, I'll add a preface to the HOWTO doc on the minimum requirements. thanks to diana_coman for gathering them up once upon a time.
mircea_popescu: i think you misconstrue alf's padding algo.
PeterL: no, recipient goes through his list of keys A and B until he finds the one that decrypts it
mircea_popescu: PeterL and then you add key A and B to the message at the end so recipient can un-pad ?
mod6: edivad's environment is indeed some sort of non-developer version of linux that has almost no tools pre-installed. also, had some non-english version, which my V does not work with. Yesterday asked him to remove gpg v2, and install v1.4.10.
PeterL: this is the padding algorithm described by alf: take random bits r and message x, encrypt r to key A and encrypt (r XOR x) to key B
mircea_popescu: PeterL the other problem this discussion reveals, of course, is that you aren't using any padding ?
mircea_popescu: PeterL the broader point here being that you can't warn the user about things he can't control. you gotta provide for it yourself.
PeterL: aha, that seems like a logical solution.
mircea_popescu: https://www.ti89.com/cryptotut/rsa3.htm << very handy rsa tutorial in that it uses base 10 and alphabet-indexing for letters. so one can actually rsa by hand and get a good model of what's going on. ☟︎
mircea_popescu: PeterL the logical approach would be to include a checksum neh ?
PeterL: if you have an encrypted text c, then c ^ d mod n will give an integer, without previously knowing m, how will you check for congruence?
mircea_popescu: or how shall i best put it, that's not equality but modulo congruence. whereby 7 = 5 mod 2
mircea_popescu: this is the basis of rsa : m ^ e ^ d = m mod n
PeterL: oh, wait, no, I didn't see the extra ^ e in there
mircea_popescu: yes, but would that integer then also be m ?
PeterL: well, won't that calculation always result in an integer?
mircea_popescu: so you are telling me that m ^ e ^ d mod n always has an integer solution for randomly chosen parameters. ☟︎
PeterL: not that using the wrong key will give you the plaintext message, but that if it uses the wrong key and happens to match the cs for that key, it will pass the pile of garbage on to all the peers
PeterL: so I guess "too small" would be something like two or less?
mircea_popescu: 0 length isn't usually what one thinks of when seeing "too small". same istrue if 1 byte string ?
PeterL: using the wrong key will result in a random byte string, so with a cs of 1 byte, you have 1/256 chance of looking like it was the right key ☟︎
PeterL: if you have a 0 byte cs, then every message looks good ☟︎
a111: Logged on 2017-08-08 23:33 mircea_popescu: PeterL +# IMPORTANT NOTE: if the cs is too small, messages have a chance to get decrypted by the wrong key << what is the logic behind this ?
PeterL: http://btcbase.org/log/2017-08-08#1695504 << so the program goes through the keys and checks the decryption against each challenge-string ☝︎
mircea_popescu: you gotta have the params set correctly
mircea_popescu: and mind that m-r is a ~probabilistic~ test.
PeterL: so yes, using the fermat test would be bad
PeterL: I tested the fermat test, and with 100 numbers of 1024 bits deemed prime by the fermat test, 50 were found to be composite by miller-rabin
PeterL: I looked at miller-rabin, and switching over to that algorithim is quite simple
a111: Logged on 2017-08-08 23:26 mircea_popescu: PeterL http://btcbase.org/log/2017-08-08#1695421 << is this supposed to interface with sina's item ?
PeterL: http://btcbase.org/log/2017-08-08#1695498 << this is completely unrelated to sina's item ☝︎
PeterL: hi, thanks for the !!up, my key is on another computer
mircea_popescu: what happened to your key ?
deedbot: http://phuctor.nosuchlabs.com/gpgkey/B47B72AF088972BB3797D9E788CB4552536D6536CAB9BD720FAC499CC89527BF << Recent Phuctorings. - Phuctored: 1781...1313 divides RSA Moduli belonging to '210.48.108.183 (ssh-rsa key from 210.48.108.183 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (gordon.mostfm.com. NZ AUK)
deedbot: http://phuctor.nosuchlabs.com/gpgkey/B47B72AF088972BB3797D9E788CB4552536D6536CAB9BD720FAC499CC89527BF << Recent Phuctorings. - Phuctored: 1537...4537 divides RSA Moduli belonging to '210.48.108.183 (ssh-rsa key from 210.48.108.183 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (gordon.mostfm.com. NZ AUK)
edivad: but i've done two times becouse the first has gone wrongly to the standard output
edivad: i know, it wasn't a smart move, but if you see a spike of traffic now you know that it wasn't a ddos attempt
mircea_popescu: anyway, forward your thanks to phf for allowing your exericse.
mircea_popescu: well so if you thought that you could have asked before rather than after eh.
edivad: ok thanks, intially i thought that maybe doing 400-500 mb of http traffic could be seen as a bad thing
mircea_popescu: they also end up on archive.is, because the bot archives links and the odds of a whole day going by without a single log reference are small.
edivad: I've done it yesterday for a friend that asked me a dvd with the logs inside, to read them when on holiday with no internet access
edivad: is allowed/polite to scrape all the btcbase.org/log website?
edivad: a thing that i've not asked and now i remembered
edivad: thanks BingoBoingo for the help
mircea_popescu: read the help would you.
jhvh1: BingoBoingo: The operation succeeded.
BingoBoingo: !~later tell trinque maybe look into the edivad deedbot registration thing? Guy is having a hard time
mircea_popescu: lol nothing works for this guy does it.
mircea_popescu: and in other civilised behaviours : always remember to hold pinky elevated! http://68.media.tumblr.com/e0686d449baf8a8d73a2199a83f7780c/tumblr_o1f357D0Zh1sr105eo1_1280.jpg
edivad: let me try
mircea_popescu: use !!v in pm to deedbot.
edivad: when i'll login again in IRC, what command should i use to authenticate?
edivad: tried now to install the common bitcoin core dependencies with apt
edivad: let me copy the entire error log
edivad: gcc is already the newest version (4:5.3.1-1ubuntu1).
edivad: in this case what is missing?
mircea_popescu: and in random other lulz : it's funny how the libertards worshipping at the watergate shrine usually omit to mention that by then washington post had been a libel tabloid for years. somehow dillard stokes' name never comes up. somehow they don't seem to notice it always was simply us sturmer.
BingoBoingo: edivad: Just remember that hunger can be the most devious thief of all as evidenced by kakobrekla's 500 BTC car. Every situation is different, but many of them rhyme.
edivad: now that i've registered my pgp key, should i be able to authenticate signing something?
edivad: well, I have a spare brazilian passport in the drawer, so when I've read the universal plan, I instantly got some very powerful energy for a future exit plan
BingoBoingo: Painting done well is a perfectly respectable trade.
mircea_popescu: i can see that heh
edivad: but then after a month i realized that I was needing a better plan
edivad: since it was the first work experience, I was even able to enjoy it
edivad: in this summer holidays aside of ruinous altcoin trading I've done some painter job paid 5 euros/hour
BingoBoingo: For the latest wave of Vandals!
mircea_popescu: what are they to build in italy ?
edivad: mircea_popescu: because the universal plan for wealth makes some great guidelines, but then since every situation is different, I'm trying to understand if there is a better approach for who hasn't already a job and is studying
mircea_popescu: this is how growing up goes : you take stock of situation, you make a plan, you implement it.