254900+ entries in 0.144s

mircea_popescu: the bitch with high level cognition, be it math, fucking, programming horses, riding computers et all is
that you never fucking know which
the same
thing you'll be doing
this
time
mircea_popescu: just vague memories from back when i knew friends with rainbow
tables.
mircea_popescu: still simpler
than your
thing, and imo better collision resistance (now h(s) = h(s+s') is required which iirc is
tougher
than (s+x) = (s+y) )
mircea_popescu: asciilifeform
t1 you publish K.sign(hash(S)) ;
time
t2 you publish J.sign(hash(S+S')) ;
time
t3 you publish S and S'
thus proving J knew before everyone else.
mircea_popescu: asciilifeform i don't require
that len(h(x)) < len(x).
mircea_popescu: hey, you're breaking rsa over
there, do some useful stuff!
mircea_popescu: the one important salient point here is
that what we would really like for a hash function would be a H so
that it is mathematically proven
that NO j' exists so
that h(s+j) = h(s+j')
mircea_popescu: still, i wouldn't say
these differences allow for a strict determination.
mircea_popescu: well yes, but in my secret-k scheme
the epsilon is my domain alone.
mircea_popescu: now
this said, a provably collision-resistant h might be found ; and would be amply useful.
mircea_popescu: and
the problem of
t3-t1 being an interval at enemy's discretion rather
than your discretion remains.
mircea_popescu: this is STILL a weaker standard
than "gimme s in h(s)" albeit not quite as catastrophically bad as prevbiously
thought
mircea_popescu: so he'll have
to find proper salt-collision, h(s+j') = h(s+j)
mircea_popescu: and see
the comments above re weaker standard and bad
time exposure.
mircea_popescu: at
time
t1+e hitler publishes J' ; at
time
t2+e hitler publishes S'.
mircea_popescu: and
t3-t1 is in his control, whereas epsilon is in mine
mircea_popescu: also enemy has
t3-t1
to fish for
the pair ; as opposed
to epsilon
mircea_popescu: this is a much weaker standard of failure for h
than "here's h(s)
tell me s"
mircea_popescu: at
t1.5 hitler deedbots J', at
t2.5 hitler deedbots S' so
that hash(s'+j') = hash(s+j)
mircea_popescu: asciilifeform your scheme is actually dead in
the water because between
t2 and
t3 enemy can deedbot in your name.
mircea_popescu: because of
the whole "array of keys"
thing, it'd actually allow jumping over dead rsa
mircea_popescu: the correct pill
to all of
this being, of course, gossipd.
mircea_popescu: in general "collapsed cryptosystem" reduces one
to a "either you have
time-order and single-message or else you restart from scratch".
mircea_popescu: suppose for safety of
this scheme, ? is made so
that create-key
takes a day.
mircea_popescu: this however is a necessary assumption (seen in
t1
t2 etc) and not escapable in
the current paradigm.
mircea_popescu: this system presumes
there's such a
thing as ordering of events.
mircea_popescu: J.sign("Here's
the laydown : 1. rsa got fucked,
this is
the process
to exrtract privkey from pubkey ; 2. message so-and-so on deedbot was creating by so-hashing
this salt and
this pubkey ; 3.
this here key J was created by using cryptoisystem ? with rng = privkey.K, which guarantees i am
the one
that made it ; 4. please use
this here J' in future")
mircea_popescu: i don't.
the point is
to prove K-J continuity , not
to retain sole control of J
mircea_popescu: well no, i just publish
the fingerprint. as per
t2 = rsa broken, it
then follows one can extract privkey.K from K
mircea_popescu: then at
t2+epsilon when i publish k you extract privkey.K from it and check
that J was made by create-key(privkey.K_
mircea_popescu: because
the only one who could make j is
the one who at
t1 owned privkey.L
mircea_popescu: i publish k, you a) verify it hash-salts
to same value and b) encrypt
to it
mircea_popescu: in
this scheme, hash has
to be epsilon-strong and
that's all.
mircea_popescu: which is why yours and
this are equivalent (they depend on
the strength of has function)
mircea_popescu: asciilifeform but he has
to also break
the salted hash
mircea_popescu: at
t2+epsilon, everyone can verify K-J continuity ; at
t2 only breaker of rsa can verify.
mircea_popescu: this doesn't matter so much, future cryptosystem will be made on
the basis of rng ; rng can work with pubkey as entropy source.
☟︎ mircea_popescu: asciilifeform for one
thing, unpublished key is a simpler variant. create secret key K, salt-and-hash K, publish K. at later point divulge K. verification is one step and passive for you.
trinque: oh boy, here comes
the
tornado
trinque: I'm doing
the paste-import
thing. patience rAISellers
shinohai: Weird why he hasn't been seen yet, his key imported
to keyserver