log☇︎
4900+ entries in 0.463s
ascii_butugychag: otherwise stuck with pure rsa
ascii_butugychag: unproven hardness of rsa!
ascii_butugychag: and now i wonder how the fuck mircea_popescu can live with rsa
asciilifeform: doesn't even include rsa.
ascii_butugychag: if they aren't prime, you're using multiprime rsa and if your smallest prime is small, you get, e.g., pollard-rho'd
mircea_popescu: isn't any "rsa-like" symmetric cypher basically an immature or partial implementation of
ascii_butugychag: i now strongly suspect that blumblumshub can be proven to equal rsa in hardness
asciilifeform: phf: no rsa in there. will have to write it.
jurov: RSA's feature that allows bad number generators to a ect other keys in such a public way is problematic."
assbot: RSA (cryptosystem) - Wikipedia, the free encyclopedia ... ( http://bit.ly/1NE5PYX )
jurov: https://en.wikipedia.org/wiki/RSA_%28cryptosystem%29#cite_note-26 EFF phuctored rsa keys in 2012?
ascii_butugychag: jurov: you can trivially do it right now, just walk all of sks, if the pubkey is - well - public, you can determine that someone rsa'd to it
mircea_popescu: and incidentally, as a bright mathematical mind pointed out once, "at some point the effort invested in stating rsa is 'widely researched' exceeds the effort ever expended into researching it"
asciilifeform: (as secure as 8x the bits of rsa!1111111)
asciilifeform: problem is that one doesn't get to 'make a name' in academe as 'cryptographer' by pushing rsa. ☟︎
ascii_butugychag: do you see nsa putting 400 usd bounty on breaking rsa ?
mircea_popescu: <BingoBoingo> RSA offers a longer hisotry of being studied and attacked << more importantly, it actually fits in head. a 12 yo's head.
BingoBoingo: RSA offers a longer hisotry of being studied and attacked
BingoBoingo: Why would anyone use GPG2, or ECC when RSA is available
BingoBoingo: Generating GPG keys that don't suck is hard because RSA encryption is decrypted by division. Too easy to divide, falls. ECDSA in Bitcoin gets more breathing room for now because not as straight forward.
ascii_butugychag: seal ~= rsa modular exponentiant.
ascii_butugychag: sigil =~= rsa modulus
assbot: sybren / python-rsa / Pull request #14: [security] Fix BB'06 attack in verify() by switching from parsing to comparison — Bitbucket ... ( http://bit.ly/1MT5Xn1 )
ascii_butugychag: https://bitbucket.org/sybren/python-rsa/pull-requests/14/security-fix-bb06-attack-in-verify-by/diff << his patch. how would you react to a fella half-heartedly removing a tick from the back of a roadkill deer flattened on a highway ?
assbot: Logged on 06-01-2016 12:38:49; shinohai: !s https://blog.filippo.io/bleichenbacher-06-signature-forgery-in-python-rsa/
assbot: 0 results for 'https://blog.filippo.io/bleichenbacher-06-signature-forgery-in-python-rsa/' : http://s.b-a.link/?q=https%3A%2F%2Fblog.filippo.io%2Fbleichenbacher-06-signature-forgery-in-python-rsa%2F
assbot: Bleichenbacher'06 signature forgery in python-rsa ... ( http://bit.ly/1n3W4hv )
shinohai: !s https://blog.filippo.io/bleichenbacher-06-signature-forgery-in-python-rsa/ ☟︎
asciilifeform: but looks like the actual rsa op was carried out WITH THE SUBKEY
asciilifeform: it is in the attempt to divorce the abstraction of what the user is doing from the actual rsa (moduli)
jurov: gpg: Signature made So 26. december 2015, 01:37:34 CET using RSA key ID 01ABFFC7
ascii_rear: (how many times can you use, e.g., a pill against rsa ?)
mircea_popescu orders derpy server to create 4096b rsa key
kakobrekla: gpg: Signature made Sat 26 Dec 2015 12:37:34 AM UTC using RSA key ID 01ABFFC7
assbot: Logged on 23-12-2015 17:32:23; mircea_popescu: rsa, sadly, wouldn't really work for this application
mircea_popescu: rsa, sadly, wouldn't really work for this application ☟︎
ascii_field: mircea_popescu: 'Not only are they part of the transaction, not only are they an integral part of the transaction : they are the only actually needed part. What makes a transaction a transaction is the signature, nothing else. Everything else is like marketing : contributes to costs, not to revenue.' << here i will note that, if bitcoin used rsa sigs, the tx and the signature could be literally one and the same thing
asciilifeform: stronger_key_check ( RSA_secret_key *skey )
asciilifeform: i also can't help but appreciate the sheer magnitude of the 'fud' surrounding 'd-wave' - as if there could be any doubt whatsoever that the box is a work of charlatanry (doesn't run shor's algo and break rsa? not quantum comp. QED.)
asciilifeform: aaah yeaaaah sure, sslizing my rsa key makes me ah so hot&bothered
mircea_popescu: anyway, none of this is even practical without mass cardanos, because iirc c-s consumes even more entropy than rsa.
ascii_field: aha, rsa homomorphism diddle
mircea_popescu: let us indulge then. cramer-shoup is an asym key system, just like rsa or ecc.
mircea_popescu: "Although the potential development of quantum computers threatens the security of many common forms of cryptography such as RSA, "
mircea_popescu: but so far we don't even know if we actually want rsa (this for lack of gossipd) nor have we studied shoup etc.
mircea_popescu: and while at it, new, pure-rsa signature scheme.
mircea_popescu: "Cuccias said that Nest Cam uses 128-bit SSL encryption, Perfect Forward Secrecy and a 2048-bit RSA key that is unique to each camera. “This ensures that videos are not accessible, even over open WiFi networks. That said, customers can always see the status of their camera through the Nest app,” "
asciilifeform: y'know, the folks who pop rsa, plant rf bugs in cpu masks, etc.
mircea_popescu: anyway, to put the thing in more distant, and thus perhaps more comprehensible terms even if you'll likely not be able to resist the temptation to crush naisl with the microscope : "what is the value of rsa to kenyan ?" and "obviously all this 'crypto work' is general 20yo cunt good looks" to kenyan.
ascii_field: 'The AES-256-CBC algorithm is used to encrypt files; all files are encrypted with the same key... In spite of the scary stories about RSA-2048 shown to victims, this encryption algorithm is not used by the malware in any form... The AES-256-CBC algorithm is used to encrypt files; all files are encrypted with the same key.'
mircea_popescu: well... rsa is malleable, right ? :D
ascii_field: davout: now there's proprietary crud in the cartridge ~and~ the printer that rsa to one another.
asciilifeform: sane people understand enough to wish for their rsa modular exponentiations to NOT HAPPEN UNDER WINBLOWZ
asciilifeform: otherwise the fw is rsa-signed (2048b iirc)
assbot: Logged on 25-10-2015 21:51:05; mircea_popescu: he had a "business" to make 8kb or larger rsa keys for "Cusomers"
mircea_popescu: he had a "business" to make 8kb or larger rsa keys for "Cusomers" ☟︎
referredbyloper: Thanks. I just read the post about phuctor breaking an rsa key.
ascii_field: rsa exists.
assbot: Breaking 512-bit RSA with Amazon EC2 is a cinch. So why all the weak keys? | Ars Technica ... ( http://bit.ly/1RW95nf )
asciilifeform: in other nyooz, http://arstechnica.com/security/2015/10/breaking-512-bit-rsa-with-amazon-ec2-is-a-cinch-so-why-all-the-weak-keys
assbot: On how the factored 4096 RSA keys story was handled, and what it means to you. on Trilema - A blog by Mircea Popescu. ... ( http://bit.ly/1NlQkIc )
mircea_popescu: /#selection-217.0-221.245 ; see http://trilema.com/2015/on-how-the-factored-4096-rsa-keys-story-was-handled-and-what-it-means-to-you/#selection-685.0-685.123 and the whole fucking corpus already. when "they" come for the derps i'll be fucking there shooting pregnantg mothers in the uterus and stepping on baby derp necks.
ascii_field: cameraball is a hypothetical device consisting of sealed pyrex sphere with two fish-eye cameras inside. charged and addressed via induction coil. contains a certain amount of eeprom, signs each frame with rsa key, which is zeroed if the glass is penetrated.
ascii_field: (a civilized setup will have rsa backing on both sides)
phf: so gossipd is "in progress", but fella's not been heard from in a very long time. gpg has not been started, but ascii presumably has a lot of ideas about it. then there's pie in the sky projects, like fabricating own cpus or rsa over udp routers.
mircea_popescu: can you demonstrate rsa malleability in the sense of, appending "pete_dushenski.rate.punkman.2:" as prefix to cyphertext ?
ascii_field: so he modifies assbot so that the next time mircea_popescu is given otp token, it is actually carrying the rsa-enciphered symmetric key from $message
ascii_field: but what you actually decrypted with rsa was a random blob
ascii_field: rsa is malleable.
asciilifeform: 'Given that we are expecting to soon switch from RSA to ECC for improved security and that the current base of OpenPGP implementations supporting ECC is quite small, I would recommend not to allow a second fingerprint format for v4 keys but to bind a new fingerprint format to a v5 key packet version.' << who the fuck is 'we' ?!
mircea_popescu: asciilifeform how is unpadded rsa supposed to work ?
asciilifeform: and to that we have analogy: the pure-rsa variant
asciilifeform: not on account of rsa per se.
asciilifeform: and this still is predicated on an assumption, to date unproven, that rsa sig operation is not malleable.
ascii_field: not if it were an rsa sig
ascii_field: the most pedestrian hypothesis here is that rsa is considerably easier to implement.
ascii_field: https://www.theiphonewiki.com/wiki/Pwnage << correct. rsa.
mircea_popescu: i find it comedic that for all the "well documented" flaws of rsa, all these "take over the world" computing schemes fail to use ECC.
ascii_field: mircea_popescu: it has rsa sig checker in mask rom which runs on reset
ascii_field: all drivers must be rsa-signed;
ascii_field: as in rsa-signed.
brg444: followed pete's guide here: http://www.contravex.com/2014/09/23/please-to-pgp-guide-for-linux-os-x-windows/ so 4096 RSA it is I believe
ascii_field: specifically non-rsa ?
mircea_popescu: so facebook supports non-rsa-only pgp ? heh mkay.
assbot: Logged on 21-09-2015 18:16:12; ascii_field: phun phakt: it is not a proven fact that the difficulty of the rsa problem as such is equivalent to that of factoring.
ascii_field: phun phakt: it is not a proven fact that the difficulty of the rsa problem as such is equivalent to that of factoring. ☟︎
assbot: 9 results for 'rsa pill' : http://s.b-a.link/?q=rsa+pill
ascii_field: !s rsa pill
assbot: 0 results for 'https://medium.com/quantum-bits/break-rsa-encryption-with-this-one-weird-trick-d955e3394870' : http://s.b-a.link/?q=https%3A%2F%2Fmedium.com%2Fquantum-bits%2Fbreak-rsa-encryption-with-this-one-weird-trick-d955e3394870
assbot: Break RSA encryption with this one weird trick — Quantum Bits — Medium ... ( http://bit.ly/1PkJZwA )
shinohai: !s https://medium.com/quantum-bits/break-rsa-encryption-with-this-one-weird-trick-d955e3394870
ascii_field: the reason for this is that (as anyone who stayed awake in kindergarten ??) knows, rsa operation is malleable
ascii_field: the basic idea of 'padding' is that before you can really use rsa, you have to proclaim 'i will NEVER EVEN consider a blob that doesn't decrypt to this-standard-boilerplate-and-the-payload' - or, in the case of signatures, 'it is ~not~ a signature unless the signed payload is such-and-such-boilerplate-and-THEN-the-actual-payload'
ascii_field: wait till you do rsa padding !
ascii_field: accompanied by unsubstantiated claims of 'equivalence' between long rsa and short ecc key 'hardnesses'
ascii_field: e.g., the push for movement from rsa to ecc
punkman: " Cross-VM RSA Key Recovery in a Public Cloud"
mircea_popescu: "You dont need entropy to create an ECDSA signature. You do need it to create an RSA signature, for padding."
punkman: and some more on debiasing dice http://webcache.googleusercontent.com/search?q=cache:M_P9vZTEa3kJ:www.emc.com/emc-plus/rsa-labs/ps/dicebits.ps+&cd=6&hl=en&ct=clnk&gl=us
asciilifeform: BingoBoingo: phun phakt: you can natively do 1024-bit rsa on the '92.