log☇︎
88 entries in 0.684s
asciilifeform: in other lulz, 'The Go implementation of the P-256 elliptic curve had a small bug due to a misplaced carry bit affecting less than 0.00000003% of field subtraction operations.'
asciilifeform: diana_coman: elliptic curve cipher
mircea_popescu: elliptic curve based crypto
a111: Logged on 2017-11-16 11:27 apeloyee: http://btcbase.org/log/2017-11-15#1739374 << can you enlighten us about why you believe there's no way to use information about range of factors (because you say so?), and about the http://btcbase.org/log/2017-11-15#1739371 as regards the number field sieve, as this doesn't seem to be published (or perharps for quadratic sieve). elliptic curve does benefit from smaller factors, but if the...
apeloyee: http://btcbase.org/log/2017-11-15#1739374 << can you enlighten us about why you believe there's no way to use information about range of factors (because you say so?), and about the http://btcbase.org/log/2017-11-15#1739371 as regards the number field sieve, as this doesn't seem to be published (or perharps for quadratic sieve). elliptic curve does benefit from smaller factors, but if the... ☝︎☝︎☟︎
a111: Logged on 2017-08-09 17:59 mircea_popescu: basically they had this early elliptic curve crypto, implemented as an arbitrary cone on which they wrapped a string. because the string is fixed length see, whereas the section of cone is not.
mircea_popescu: asciilifeform you don't know it's ACTUALLY different ; the expression sounds different, but there's a clear modulo space / elliptic curve relation.
asciilifeform: 'Koch then moved into Elliptic Curve Cryptography (ECC), which he discussed at some length. RSA, he said, is not likely to stay secure for much longer without really large keys. Support for 4096-bit RSA keys has been in GnuPG for some time, but Koch contends that real security will require 16Kb keys; that makes keys, fingerprints, and signatures all unusably long, particularly for embedded devices and hardware security modules (HSMs)
mircea_popescu: it's the converse of the modular math / elliptic curves geometry equivalence.
mircea_popescu: http://btcbase.org/log/2017-09-28#1718014 << this conceivable is of the same nature of conception as "wilkes proved there's no elliptic curves without modular forms, therefore we can use ecc instead of rsa" ☝︎
asciilifeform: '~All general-purpose modular reduction involves numerator- and denominator-dependent branches... ...includes modular reduction for elliptic curve arithmetic, in which the numerator is secret; and modular reduction for RSA, in which the numerator (plaintext message) or denominator (p, q) can be secret.'
mircea_popescu: basically they had this early elliptic curve crypto, implemented as an arbitrary cone on which they wrapped a string. because the string is fixed length see, whereas the section of cone is not. ☟︎
a111: Logged on 2017-06-09 14:26 shinohai: http://archive.is/pRUJY "CoinDesk is a subsidiary of DCG, which has an ownership stake in Chainalysis, Coinbase and Elliptic." ... /me did not know Shillbert supported "Blockchain Law Enforcement" so heavily.
a111: Logged on 2017-06-09 14:26 shinohai: http://archive.is/pRUJY "CoinDesk is a subsidiary of DCG, which has an ownership stake in Chainalysis, Coinbase and Elliptic." ... /me did not know Shillbert supported "Blockchain Law Enforcement" so heavily.
shinohai: http://archive.is/pRUJY "CoinDesk is a subsidiary of DCG, which has an ownership stake in Chainalysis, Coinbase and Elliptic." ... /me did not know Shillbert supported "Blockchain Law Enforcement" so heavily. ☟︎☟︎
erlehmann: i suspect he has at least a prototype, but he has never published it. reason: i found dofiles in some stuff about elliptic curves.
erlehmann: apparently he implemented at least parts of it. some of his elliptic curve stuff has dofiles.
asciilifeform: 'The so-called "key image" as used in CryptoNote coins utilising elliptic curve ed25519 can be modified in a special way, allowing double-spends. ' << lel
a111: Logged on 2017-01-26 14:40 Framedragger: ...and so it is that tmsr uses elliptic curve crypto in its production :)
Framedragger: ...and so it is that tmsr uses elliptic curve crypto in its production :) ☟︎
asciilifeform: 'The signing function in crypto/ecdsa/ecdsa_ossl.c in certain OpenSSL versions and forks is vulnerable to timing attacks when signing with the standardized elliptic curve P-256 despite featuring constant-time curve operations and modular inversion. A software defect omits setting the BN_FLG_CONSTTIME flag for nonces, failing to take a secure code path in the BN_mod_inverse method and therefore resulting in a cache-timing attack vulne
asciilifeform: ed on algebraic MACs. [3] The construction of this scheme required a library for working with points on an elliptic curve, [4] which Henry de Valence and I have implemented in Rust, using a curve25519 in Edwards form. Henry has made more detailed announcement of our curve25519-dalek library on the curves mailing list, [5] and our documentation is also available online. [6]'
mircea_popescu: very reminiscent of elliptic curve "cryptography".
asciilifeform: though their 'is' is quite lulzy, e.g., the sks server talk is about 'This talk will discuss some experiences operating the services and discuss new features related to new specifications such as Elliptic Curves (including but not limited to Ed25519 and Curve25519) and the experimental Tor support available at hkp://jirk5u4osbsr34t5.onion in addition to providing an overview of the other available pools such as the TLS enabled HKPS p
fabio__: "Part of their efforts is the push towards Elliptic Curve Cryptography (ECC) to replace RSA, in spite of obvious mathematical weaknesses in this proposition.
asciilifeform: 'Recently, the IWF provided Elliptic a database of bitcoin addresses that they identified with child porn. With this information, Elliptic can identify those illegal activities on the blockchain (bitcoin’s public ledger of transactions). James Smith, CEO of Elliptic said this regarding their involvement: “This is the first time anybody has started identifying these crimes in bitcoin and flagging them up in a system like ours. Thi
pete_dushenski: ithm might turn out to be breakable even with today's computers, in which case the elliptic-curve algorithm will still provide the best security that today’s technology can offer." << l0l!!!
pete_dushenski: "Today we're announcing an experiment in Chrome where a small fraction of connections between desktop Chrome and Google's servers will use a post-quantum key-exchange algorithm in addition to the elliptic-curve key-exchange algorithm that would typically be used. By adding a post-quantum algorithm on top of the existing one, we are able to experiment without affecting user security. The post-quantum algor
shinohai: "IWF ... has provided a database of bitcoin addresses associated with sexual abuse to the startup. Elliptic" http://archive.is/CmZNi
asciilifeform: function SHA-1. Given the seed and its associated elliptic curve, anyone
asciilifeform: cients of an elliptic curve were derived by passing a seed through the hash
asciilifeform: 'To ensure that the NSA-generated elliptic curves did not belong to a very
thestringpuller: "Here are several reasons you should stop using RSA and switch to elliptic curve software:"
mircea_popescu: incidentally, i suspect a lot of the mommentum for the entire "oh broken factors" comes from historical accident. it was in point of fact research into elliptic curves that yielded the fermat proof,
assbot: RFC 6979 - Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) ... ( http://bit.ly/1hDtz7U )
assbot: Elliptic Curve Cryptography Functions | Intel® Developer Zone ... ( http://bit.ly/1UTBw78 )
assbot: PCLMULQDQ Instruction and Elliptic Curve Cryptography: Paper ... ( http://bit.ly/1UTBsEd )
ascii_field: good enough. it'll offload the scratch storage for the elliptic grind to dedicated sram
ascii_field: (the nsa elliptic curve memo)
asciilifeform: 'It is important to note that we aren’t asking vendors to stop implementing the Suite B algorithms and we aren’t asking our national security customers to stop using these algorithms. Rather, we want to give more flexibility to vendors and our customers in the present as we prepare for a quantum safe future. Where elliptic curve protocols are to be used, we prefer Suite B standards be used to the fullest extent possible a
BingoBoingo: asciilifeform: That. Or like Elliptic curve in lieu of RSA
assbot: Anti-Money Laundering - Elliptic ... ( http://bit.ly/1JmebYZ )
asciilifeform: https://www.elliptic.co/anti-money-laundering << usgtron with elaborate graph ad
assbot: Loper OS » Practical Cryptoanalysis of Elliptic Curve DSA. ... ( http://bit.ly/1dgzFIl )
assbot: Bitcoin: Elliptic says its anti-money laundering tool could get banks interested in cryptocurrency - Business Insider ... ( http://bit.ly/1HZtPbh )
punkman: http://www.businessinsider.com/bitcoin-elliptic-startup-anti-money-laundering-tool-get-banks-interested-cryptocurrency-2015-6
asciilifeform: students of elliptic curve crypto should find herr koblitz familiar name
ascii_field: one of the state-of-art factorizers, lenstra's elliptic curve factorization,
assbot: ECCHacks - A gentle introduction to elliptic-curve cryptography [31c3] - YouTube ... ( http://bit.ly/1aOq8Yt )
BingoBoingo: punkman: He's got some really good ideas, but an elliptic curve? really?
Adlai: (my idea has exactly nothing to do with elliptic curves)
mircea_popescu: like... srsly, floats rather than elliptic curve points ?!
Adlai: elliptic curve points
asciilifeform: curiously, it even has a hardware galois field multiplier. to tempt folks using elliptic curves.
asciilifeform: 'one cannot safely just ignore the advice of the cryptographic community about the elliptic curves. Not taking these questions seriously is bad, potentially a gross professional misconduct, and one could in theory even go to prison for that on the basis of some existing laws, for example safeguards rule in the US Gramm-Leach-Bliley Act...' << obey or gasenwagen!
assbot: Controversy Around Bitcoin Elliptic Curve | Financial Cryptography, Bitcoin, Crypto Currencies ... ( http://bit.ly/1IC2A5J )
assbot: Controversy Around Bitcoin Elliptic Curve | Financial Cryptography, Bitcoin, Crypto Currencies ... ( http://bit.ly/1ztbFJE )
assbot: cr.yp.to: 2014.03.23: How to design an elliptic-curve signature system ... ( http://bit.ly/1GhdfyE )
cazalla: BingoBoingo, what i read as a fix is just as likely to be now broken and vice versa, so i would prefer to defer to those smarter in here, i'm sure someone will discuss the addition of elliptic curve keys at some point
assbot: 25 results for 'elliptic' : http://search.bitcoin-assets.com/?q=elliptic
asciilifeform: !s elliptic
mircea_popescu: decimation: asciilifeform: which is why elliptic key systems still have doubt cast upon them (plus the patent issues) << plus the fact schneier is pushing them
assbot: Curve25519: high-speed elliptic-curve cryptography
decimation: asciilifeform: which is why elliptic key systems still have doubt cast upon them (plus the patent issues)
bitcoinpete: "Elliptic offers a secure, insured bitcoin service called Elliptic Vault for retailers, hedge funds, bitcoin exchanges and other companies that are trying to dabble in this new world of so-called cryptocurrencies."
bitcoinpete: elliptic and tradeblock
assbot: Elliptic takes $2M investment to help firms store and handle bitcoin — Tech News and Analysis
bitcoinpete: http://gigaom.com/2014/07/16/elliptic-takes-2m-investment-to-help-firms-store-and-handle-bitcoin/
Phinnaeus: I thought Hannah was the primer on elliptic curves.
assbot: A (Relatively Easy To Understand) Primer on Elliptic Curve Cryptography | CloudFlare Blog
mike_c: http://blog.cloudflare.com/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography
decimation: "Why do you only support Elliptic Curve (EC) key generation? Generating RSA keypairs is very significantly slower than generating EC-based ones. EC-based keys are just as secure. "
gribble: Schneier on Security: Rubber-Hose Cryptanalysis: <https://www.schneier.com/blog/archives/2008/10/rubber_hose_cry.html>; Loper OS » Practical Cryptoanalysis of Elliptic Curve DSA.: <http://www.loper-os.org/?p=1061>; Cryptanalysis - Wikipedia, the free encyclopedia: <http://en.wikipedia.org/wiki/Cryptanalysis> ☟︎
BingoBoingo: Yeah, looks like some of the elliptic curve stuff is going to be endangered
BingoBoingo: Popular choices for the group G in discrete logarithm cryptography are the cyclic groups (Zp)× (e.g. ElGamal encryption, Diffie–Hellman key exchange, and the Digital Signature Algorithm) and cyclic subgroups of elliptic curves over finite fields (see elliptic curve cryptography).
ozbot: Re: Elliptic curves in gnupg status?(ECC support)
BingoBoingo: I mean for the first set you could probably encode information much as RSA does. I don't have enough vodka on hand to speculate if that would be a good idea. Most of Elliptic curve cryptography works on spaces that can be played with in graph theory world though.
davout: the insured guys are elliptic.co btw
gribble: Schneier on Security: Norbt: <https://www.schneier.com/blog/archives/2009/11/norbt.html>; Loper OS » Practical Cryptoanalysis of Elliptic Curve DSA.: <http://www.loper-os.org/?p=1061>; Amazon Vows To Fight Government Requests For Data - Slashdot: <http://slashdot.org/story/13/06/19/2238212/amazon-vows-to-fight-government-requests-for-data>
BingoBoingo: ThickAsThieves`: What's next? Allowing bet creators to specify elliptic curves the bet weight passes through as it degrades over time?
BingoBoingo: asciilifeform: I liken that sort of stuff to the people who support Elliptic curve cryptography because the short keys let minimalist embeded smartcard hardware carry out thousands of operations a second as opposed to hundreds for RSA with appropriately long keys.
thestringpuller: why don't mo niggas use elliptic c curve cryptographyy?
BingoBoingo: Jere_Jones: Well I'm not offering the private key until at least the last BitBet associated with that address resolves. Maybe some elliptic surves intersected at the point of that message. Maybe it is something worse. It is honestly more their problem than mine though I will be happy to offer them information short of the private key. The replication steps are surprisingly short and I imagine unhelpful.
BingoBoingo: The problem is that 1LC9GzYK1zjrG9zAvMPExcwHTP8aPYPMyY could have signed the same message. Maybe it could have signed a more malicious message. Fuck. Just because elliptic curves are sexy doesn't mean they should be used everywhere.
ozbot: Are the NIST Standard Elliptic Curves Back-doored? - Slashdot
jurov: http://it.slashdot.org/story/13/09/11/1224252/are-the-nist-standard-elliptic-curves-back-doored
thestringpuller: Hmm. In crytpo-news: Both RSA and Diffie-Hellman encryption rely on there being no efficient algorithm for that problem, but French math professor Antoine Joux has published two papers in the last six months that suggest one could soon be found. Security researchers that noticed Joux's work recommend companies large and small begin planning to move to elliptic curve cryptography, something the NSA has said is best practice for years. Unfortunat
cads: Namworld: I might be wrong by now, but at one point I learned that creating elliptic curve keys is altogether separate from the Sha hashing that GPUs excel at.