log☇︎
596100+ entries in 0.371s
mircea_popescu: ben_vulpes i have no idea, it could be done that way too
jurov: can't they jsut sign independently?
ben_vulpes: forgive my derpitude but why not simply sign the patch and collect sigs?
mircea_popescu: if you're not willing to sign the present signs you;'d better fork.
ben_vulpes: mircea_popescu, asciilifeform: re sig stack is the implication that a signs patch, b signs patch and a.sig, c patch and b.sig...
mircea_popescu: if too large, rehash.
asciilifeform: define as hash(hash... 'by the neck until dead'
jurov: just cut one bit from the hash
punkman: hash must be smaller than 0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141
asciilifeform fondly remembers donating his first real multi-cpu rig's cycles to mersenne search
mircea_popescu: why is that ?
punkman: btw some bundles can't be turned into bitcoin keys, found out by accident
mircea_popescu: o look, there's a M48. i had no idea.
asciilifeform: jurov: actually we have a deterministic primality test! with massive constant factor, but anyway.
mircea_popescu: anyway. p and q are primes. p-1 and p-1 being necessarily even, will probably have some factors. these factors could just as well be 65537
jurov: rsa is only possible because we have probabilistic primality tests for bignums up to arbitrary certainty
asciilifeform: (massive pdf turd)
mircea_popescu: oh i see, just the confusion tip is it.
mircea_popescu: stop trying to confuse me just because i have nfi of anything!
mircea_popescu: fuck. lmao. e just has to be... ODD
asciilifeform: unless one or both are equal to it
mircea_popescu: "pick 32 onbit 64bit random numbers, test for cd" is a much better approach
mircea_popescu: (and for that matter, it IS quite fucking possible for the current, fixed e implementation to spit out badly coded stuff every once in a blue moon, when the p q happen to be a multiple of 65537)
mircea_popescu: which isn't that hard to test
mircea_popescu: the idea is just for (q-1)(p-1) and e to be relatively prime
mircea_popescu: but anyway, why's e have to be prime ?
mircea_popescu: or whatever was it. i intend to hold usg at his word.
mircea_popescu: eh fuck it, usgavin promised us 100% increases each year for the next 200 years
asciilifeform: hence the obligatory whinge about new silicon
asciilifeform: yes, that is why used.
mircea_popescu: afaik it's only used because easy to compute, two 1's merged into a word
asciilifeform: but does need to be prime.
asciilifeform: it doesn't need to be.
mircea_popescu: you telling me the rsa e must be a fermat prime ? why ?
mircea_popescu: yeah google, always put wikipedia the fucking first line, because i'm sure that's what the "algorithm" says.
gribble: Mersenne prime - Wikipedia, the free encyclopedia: <http://en.wikipedia.org/wiki/Mersenne_prime>; Mersenne Primes: History, Theorems and Lists - The Prime Pages: <http://primes.utm.edu/mersenne/>; Integer Lists: Mersenne Primes - TSM Resources: <http://www.tsm-resources.com/alists/mers.html>
mircea_popescu: ah that's a point.
asciilifeform: mircea_popescu: fixed count on bits << easy as a fart. start with the bits, then shuffle with rng transpositions.
jurov: i they approve the patch
mircea_popescu: jurov oh yeah, i wasn't commenting on your implementation, i was just bitching at the stars.
asciilifeform: mircea_popescu is helpfully reminded that not all mersenne numbers are mersenne primes!
mircea_popescu: asciilifeform incidentally, know of any rng process to compute fixed count onbits random numbers ?
jurov: mircea_popescu: other people's signatures will be detached from definition... or do you want to include the patch everywhere?
mircea_popescu: i wasn't talking about the cardano! i was talking about the new pgp
asciilifeform: the 32k in me micro, that space
mircea_popescu: it's not THAT slow.
asciilifeform: mircea_popescu: that one's for when you built a Si fab
mircea_popescu: also doing away with the 65537 static and instead using any 64bit integer with exactly 32 on bits would be better.
mircea_popescu: myeah, the only bitch is that determinism.
assbot: cryptanalysis - Definition of Textbook RSA - Cryptography Stack Exchange
jurov: ha. poor qntra writer deeds will contain clause like "receiver is responsible for identifying any circumstances that may render this agreement void and act accordingly"
mircea_popescu: i guess he delivers a copy of the above ?
mircea_popescu: so make the fucking cardano already.
mircea_popescu: so no, it won't imperil them, it will just make the peril obvious
mircea_popescu: asciilifeform the cypher itself is too short anyway
mircea_popescu: jurov https is evil in the eyes of the punkbot!!1
asciilifeform: mircea_popescu: though it will further imperil folks who are enciphering on hardware without proper rng.
mircea_popescu: so that means those toolchains will have to change or die ?
asciilifeform: don't misunderstand, i like the 'fixed fields' idea, but am also aware that shitgnome excretions in a hundred places in commonplace toolchains will silently screw with it.
mircea_popescu: anyway, thgis is more an aesthetic consideratyion. ditching symmetric cyphers is the more substantial thing, and since a reimplementation happenes, might as well add aesthetics.
asciilifeform likes to examine turds with naked eyes
mircea_popescu: because i can't read that.
mircea_popescu: shit son. if only i knew about this, we could have made diff design changes on bitcoin core.
asciilifeform: only in so far as their crud has made its way into www browsers, etc
asciilifeform: but what of all those poor sods stuck on antideluvian ms-dos abominations
mircea_popescu: no, the re-pgp imp,ementation
Apocalyptic: mircea_popescu, I just found that line to fix the issue, but thank you
assbot: Logged on 16-10-2014 14:00:51; mircea_popescu: btw, cazalla bingoboingo and everyone else in the same situation : if the blob gpg spits out when you sign contains a SHA1 you are using the older, and perhaps not all that secure digest algo. you should move on to sha512 either with --digest-algo SHA512 or else edit gpg.conf to insert personal-digest-preferences SHA512 SHA384 SHA256
asciilifeform: mircea_popescu: when idiot www crud or os (anywhere in the chain) starts gnawing at your line endings, or adding line noise, you blow the fixed frame
mircea_popescu: and again, armored. nothing but letters and digits in there. not even +/ etc.
mircea_popescu: proggy gets 65kb file, cuts 16k off its end recursively, spits out 1kb of text signed by 4 people
mircea_popescu: asciilifeform obviously, since fixed length, it can go back to the end of the file.
asciilifeform: most folks never try 'gnawing through the leather straps,' but once you do - you learn how thick they are.
asciilifeform: see the 'broken glass' discussion earlier, also.
Apocalyptic: just noticed that all deeds processed by deadbot are SHA1-hashed so far
asciilifeform: which will frame-shift as the contents get procrusted by the idiot code
asciilifeform: mircea_popescu: that's not the issue. just about everyone is putting ascii through some raper that mutilates unprintables (www browsers, toy operating systems, etc)
mircea_popescu: much simpler machines to work it if it knows a straight offset
mircea_popescu: asciilifeform to make it as independent as possible ?
mircea_popescu: Apocalyptic not considered read, but weak digest. good idea to upgrade.
asciilifeform: aye, but then why fixed byte strings
mircea_popescu: file is defined as, 256bytes + "##### The following is signed above :"+message.
mircea_popescu: in that example, a 256 byte fixed sigspace.
mircea_popescu: asciilifeform not even. more like this : http://pastebin.com/JUAH07uY
bounce: sha1 is on the way out (don't use for new stuff) but not dead yet (can keep using what you have)
asciilifeform: bunchafolks have old keys (incl. yours truly)
Apocalyptic: by the way are SHA1 gpg-signed messages considered read ? I read somewhere one might rather use sha256 or higher, don't know if there's any merit to that claim
bounce: that's the technology equivalent of "hold my beer and watch this"
mircea_popescu: add to that a fixed-offset clearsigned thing, all of a sudden there's good reason to implement
mircea_popescu: you know, thinking about this, i think i actyally want pgp reimplemented. usgavin's speshul maths about how things improve make me realise that having a pure rsa based code rather than the current encode a symmetric chypher method is perhaps feasible.
mircea_popescu: clearsigned file, always 16kb long, after which the signed matter begins
asciilifeform: applicable, in that scheme, to the remainder after the ------END...
asciilifeform: one possible method - toss the sig in the head of the file
mircea_popescu: how would it do that ?
asciilifeform: till we have a gpg that clearsigns without escape char mutilation - we got this.
mircea_popescu: you don't want me to drop it, do not put it in there.
mircea_popescu: the drop callback is in the stack api.
asciilifeform: don't drop the stack.
mircea_popescu: asciilifeform: ideally, we'd have a patch and a collection of detached sigs of the plain ascii of the patch <<< detached sigs are in fact a reimplementation of the old punch cards
kakobrekla: just wait for the google to parse logs