log☇︎
1500+ entries in 0.161s
diana_coman: chugging along, collecting some data on the mpi-sane-based rsa stuff
asciilifeform: http://btcbase.org/log/2017-10-27#1730047 << i sat down to write something quite similar, and then realized that i can milk a remote node for its rsa privkey via timing , lol. but fast forward to today. ffa still on track for release for end of nov. btw. ☝︎
mod6: i did this recently when looking at the rsa thing that happened back in like august of '15
asciilifeform: dun have to be an rsa key for this, neh
mircea_popescu: anyway. ~nobody has a rsa key.
a111: Logged on 2017-10-19 07:09 mircea_popescu: http://btcbase.org/log/2017-10-19#1726582 << a) this is not factual. you manufacture power chord that only works or doesn't work, through eg http://btcbase.org/log/2017-10-12#1724529 ; b) if your power chord came with special rsa analysis and also had a special "flash power when pgp is being used" switch, you'd get into manufacturing your own power chords in very short order.
mircea_popescu: http://btcbase.org/log/2017-10-19#1726582 << a) this is not factual. you manufacture power chord that only works or doesn't work, through eg http://btcbase.org/log/2017-10-12#1724529 ; b) if your power chord came with special rsa analysis and also had a special "flash power when pgp is being used" switch, you'd get into manufacturing your own power chords in very short order. ☝︎☝︎☟︎
erlehmann: i think the infineon RSA super happy fun time triggered it
jurov: "The flaw resides in the Infineon-developed RSA Library version v1.02.013, specifically within an algorithm it implements for RSA primes generation. " ☟︎☟︎☟︎
ben_vulpes: in other weak rsa key news: https://www.yubico.com/support/security-advisories/ysa-2017-01/
asciilifeform: mod6: current ffa has no problem building and running with 32bit word; but it will not do useful work in 8/16bit msdos, and this needs fix ( i described simple fix above. my priority atm tho is barrettron and practical rsa demo )
mircea_popescu: as long as you keep your rsa key safe, of course.
a111: Logged on 2017-10-11 16:41 asciilifeform: i dun buy the 'no one has proven rsa to be hard so it dun matter how to implement it, let's use wet noodles and dried shit' argument.
asciilifeform: i dun buy the 'no one has proven rsa to be hard so it dun matter how to implement it, let's use wet noodles and dried shit' argument. ☟︎
mircea_popescu: and this isn't a joke : the "distinction" between rsa and ecc, whereby "ecc is faster" or "has longer effective key" is bs. ECC is exactly RSA in polar coordinates, if either fails mathematically both do.
a111: Logged on 2017-10-06 23:13 mircea_popescu: basically the scheme is, you rsa a random bitfield, then you expand that into as much otp as you want by doing recursively Fi = hash(bitfield + Fi-1). there's a limit on i, obviously, which can be set to 1.
asciilifeform: '...the timings from the RSA HSM showed that a doubling of the key length increased the time required to sign nearly six-fold, and the time for verification even more. The timings from the Ed25519 HSM were agreeably small (all sub-50ms).' << this is precious
asciilifeform: 'So instead he's moving toward ECC ciphers, which are well-researched — more so than RSA, according to Koch. '
asciilifeform: 'Koch then moved into Elliptic Curve Cryptography (ECC), which he discussed at some length. RSA, he said, is not likely to stay secure for much longer without really large keys. Support for 4096-bit RSA keys has been in GnuPG for some time, but Koch contends that real security will require 16Kb keys; that makes keys, fingerprints, and signatures all unusably long, particularly for embedded devices and hardware security modules (HSMs)
mircea_popescu: there's no practical way to do rsa for realtime comms, as per http://btcbase.org/log/2017-10-01#1719192 ☝︎
asciilifeform: ... it follows that a 0.85sec 4096b modexp is all you need for a reasonable 'rsa phone' item. ☟︎
asciilifeform: btw let's do the phone thing, briefly. a 4096b rsa modexp can carry 4096b , i.e. 512byte, of payload sans padding. let's conservatively suppose that padding ( and hash auth, or whatever, and/or lubyzation, etc ) costs half of the payload room. so you get 256 byte per 4096b modexp;
mircea_popescu: i wouldn't mind the dood who hacked off rsa from koch pgp and made a server that just passed encrypted comms. that's it.
asciilifeform: i too would like to meet the d00d who , e.g., wrote nonleaking realtime rsa , made a modem around it, made own FG, etc
asciilifeform: remember that ffa is not strictly for rsa.
asciilifeform: situation where rsa is breakable, but no one can yet break it, makes it the sane option . because alternative is to become a donkey fucker ( rely on face to face for all comms , hope that nobody invents listening bug, etc )
asciilifeform: you get choice between 1) rsa 2) public key crypto does not exist
apeloyee: *rsa key for 50 years
asciilifeform: fall of rsa is roughly same item as 'global warming'
apeloyee: hey, before quadratic sieve was invented, they used to say that breaking 512-bit rsa will take eleventy zillion years and it's therefore Totally Secure (tm)
asciilifeform: rather than, e.g., 'rsa broken OR aes broken OR prng broke OR riemann is false OR ...'
asciilifeform: but in light of this, a correct rsatron is still one that stands on nothing BUT the assumption that rsa is hard.
asciilifeform: if you want 'compromise' rsa, use koch's.
asciilifeform: possibly constantly, depending on the rsa keying system
mircea_popescu: basically the scheme is, you rsa a random bitfield, then you expand that into as much otp as you want by doing recursively Fi = hash(bitfield + Fi-1). there's a limit on i, obviously, which can be set to 1. ☟︎☟︎
asciilifeform: sadly, rsa per se dun come with a guarantee.
asciilifeform: me -- yes. but my understanding was that diana_coman needed only rsa.
asciilifeform: the other obvious place for gcd is rsa phi
asciilifeform: let, for concreteness, x's are 8192 bits wide ( as they are in the 4096b rsa demo. ) m - in same - is 4096b wide.
asciilifeform: ( aka rsa op )
asciilifeform: just bignum. but if you add 20ln from rsa.c (in gpg 1.4 from mircea_popescu) in, it yes encrypts/keygens/etc
diana_coman: mircea_popescu, rsa like...everything else you mean,right?
mircea_popescu: and yes, rsa properly examined did turn out to be a lot more work, and a lot more stacked shit papered over in the imperial usage, than originally thought.
a111: Logged on 2016-12-27 22:14 mircea_popescu: course since the nsa consulting work for minigame is going to produce ada rsa, it might be an idea to have an ~ada~ tmsr crypto lib.
asciilifeform: ( proper rsa is 'heavier' than most folx, incl. asciilifeform of a few yrs ago, appreciated. consider, ussr never was able to afford rsa at all. )
asciilifeform: ( incidentally fast ffalicious rsa on ~fpga~ is trivial. )
asciilifeform continues the very slow and painful walk through most of undergrad number theory that leads, possibly, to usable nonleaking rsa on pc.
mircea_popescu: in any case the problem is that i'll have to design some kind of extender, can't do pure rsa throughout because of the sheer load. there's multiple messages/sec
asciilifeform: this is a fundamental headache, innit. 'wanna use actual rsa, or that thing you've been fraudulently introduced to as rsa, that leaks key, but runs fast'
asciilifeform: that's still quite slow vs. heathen rsa.
asciilifeform: diana_coman: ffa arithmetic stack is theoretically available. however until i have barrett reduction going, it's a ~30 second modular exponentiation ( i.e. per rsa op )
diana_coman: asciilifeform, I'm currently looking at eulora rsa and I'm a bit foggy (I know and followed the bits posted in the logs but it's a long trail): what is available/ready to use atm?
a111: Logged on 2017-03-02 20:53 asciilifeform: the 'let's use anything, ANYTHING but rsa' thing really grates on me.
mircea_popescu: http://btcbase.org/log/2017-09-28#1718014 << this conceivable is of the same nature of conception as "wilkes proved there's no elliptic curves without modular forms, therefore we can use ecc instead of rsa" ☝︎
cruciform: so, the logs suggest that my 2048bit RSA key is too short - how do I register a longer one with deedbot?
asciilifeform: now you stand and fall strictly by rsa. P(rsabreak) is <= P(rsabreak OR whateverfucktardationyouusedforablockcipherbreak) , in all cases.
asciilifeform: now you stand and fall strictly by rsa. P(rsabreak) is <= P(rsabreak AND whateverfucktardationyouusedforablockcipherbreak) , in all cases.
asciilifeform: which is why i favour using rsa in place of blockcipher-hash-prng, painfully. the actual averagecase hardness of rsa is unknown and will probably remain unknown. but at least when you use ~solely~ rsa, you avoid introducing ANOTHER unknown.
mircea_popescu: it'll be sad indeed once phuctor goes away, currently serves as gazette of record of rsa pubkeys.
asciilifeform: is it rsa key ??
asciilifeform: '~All general-purpose modular reduction involves numerator- and denominator-dependent branches... ...includes modular reduction for elliptic curve arithmetic, in which the numerator is secret; and modular reduction for RSA, in which the numerator (plaintext message) or denominator (p, q) can be secret.'
asciilifeform: ( and when we do rsa, can store the reciprocal in the key, there's no particular reason to compute it every time )
asciilifeform: i'd prefer a macroscale numbertheoretical hash, even one that explicitly stands on strength of, e.g., rsa, to the currently extant soup.
a111: Logged on 2017-07-10 19:33 asciilifeform: sooo a 4096b rsa key takes about a dozen modexp's, on avg, on gpg 1.4.10
mircea_popescu: yes, but as long as you do rsa, a ^ b mod m = either a ^ b or else, a ^ b - m. that's the complete story, there are no other cases. there's specifically no k * m parameter to be explored there.
mircea_popescu: peterl that's EXACTLY what i mean though. all that shit should logically read "whose size is bit-1 rsa modulus". but they don't.
PeterL: With RSA-OAEP, one can encrypt messages whose bit-length is up to just a few hundred bits less than the number of bits in the RSA modulus, yielding a ciphertext whose size is the same as that of the RSA modulus. << It sounds like he is using a smaller amount of random bits than we are?
mircea_popescu: (tl;dr : here's proof oaep is insecure ; original "proofs" wrong ; rsa-oaep is not insecure by accident, due to rsa properteis ; here's oaep+ fixed by me to actually work)
a111: Logged on 2017-09-16 01:34 mircea_popescu: http://trilema.com/2017/tmsr-rsa-spec-extremely-early-draft/#comment-122947 << in other wtf questions.
mircea_popescu: http://trilema.com/2017/tmsr-rsa-spec-extremely-early-draft/#comment-122947 << in other wtf questions. ☟︎
deedbot: http://phuctor.nosuchlabs.com/gpgkey/E668E8C9185CD163C976FB378648E3842D4774D508DB7C3B13C43DB30E92C064 << Recent Phuctorings. - Phuctored: 1739...1219 divides RSA Moduli belonging to '80.251.133.92 (ssh-rsa key from 80.251.133.92 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (postprazdnik.ru. RU MOW)
deedbot: http://phuctor.nosuchlabs.com/gpgkey/E668E8C9185CD163C976FB378648E3842D4774D508DB7C3B13C43DB30E92C064 << Recent Phuctorings. - Phuctored: 1479...0707 divides RSA Moduli belonging to '80.251.133.92 (ssh-rsa key from 80.251.133.92 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (postprazdnik.ru. RU MOW)
asciilifeform pictures rsa sliderule...
asciilifeform: ( it is worth remembering that ffa is not built to be a museum piece, 'shortest physically possible rsa', but grudgingly made concessions liek abandoning egyptian mul -- so long as result is still fixedspacetime -- , so that it can actually be fired in anger . )
deedbot: http://phuctor.nosuchlabs.com/gpgkey/BF3562F1A4B6C4581EC3633162E02492667D4C66178258073D7E3AE232DD0D3C << Recent Phuctorings. - Phuctored: 1374...8923 divides RSA Moduli belonging to '79.174.64.63 (ssh-rsa key from 79.174.64.63 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (2377.ovz-ssd6.hc.ru. RU)
deedbot: http://phuctor.nosuchlabs.com/gpgkey/BF3562F1A4B6C4581EC3633162E02492667D4C66178258073D7E3AE232DD0D3C << Recent Phuctorings. - Phuctored: 1706...5337 divides RSA Moduli belonging to '79.174.64.63 (ssh-rsa key from 79.174.64.63 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (2377.ovz-ssd6.hc.ru. RU)
asciilifeform: but my aim is to write an rsa such that, yes, no one can be considered numerate if it does not fit in his head.
mircea_popescu: so then if joe claims the "Streamlined" rsa fits in his head, what do you do ?
asciilifeform: i'd like it not to be lost upstack, so will restate ftr : a 'optimized' rsa that no longer fits in head and is no longer demonstrably-correct , ( and worse yet, no longer operates branch-free ) is NOT RSA and is simply a turd being fraudulently passed off as the genuine article
asciilifeform: it also comes from 'reasonable' people who 'oh hey i can make rsa 1.5x faster if i use weird bases, so what if my code is now 20kline instead of 2k'
asciilifeform: it is usg.rsa.
asciilifeform: it is NOT RSA
asciilifeform: and answer is that obviously idjits will take ANYTHING you make, sane rsa, sane kalash, whatever, and Bolt Shit To The Side
asciilifeform: like kochian rsa.
mircea_popescu: i dunno how many people you will have to shoot to keep them from taking your general-purpose p-based rsa and writing a narrower, "works for rsa only" faster program.
asciilifeform: if we gotta compute on fpga, to do rsa sanely -- then fpga it is. 8192-bit regs.
asciilifeform: and use usg's rsa.
asciilifeform: and that an rsa that is not ptronic is not worth using
mircea_popescu: the sadness here is that indeed tmsr-rsa is turning into separate item from p itself.
asciilifeform: ( incidentally reader might ask 'why not do montgomery? you're doing rsa anyway' and answer is not only 'maybe tomorrow, cramer-shoup and not rsa' but also that we do things such as primality testing , and other non-rsa op )
asciilifeform: no 'speshul rsa forms' in ffa.
a111: Logged on 2017-08-10 19:45 asciilifeform: forn00bz: an, e.g., rsa modexp, in ffa, must be representable by a long roll of paper, on it are ops for ordinary 4function calculator, with very patient slave. and roll ONLY ROLLS FORWARD and has finite # of instructions on it, known in advance when you decide the ffa width.
asciilifeform: it is ok for rsa where you sink it to the bottom of the sea and never intend to change the modulus
asciilifeform: well we are talking about a O(NlogN) rsa vs a O(N^5) one
deedbot: http://phuctor.nosuchlabs.com/gpgkey/DA87978CF6FFCF25718681CFA15297476FC99BCEF0F5FB9DE3EAA5DC3326D5DA << Recent Phuctorings. - Phuctored: 1776...0149 divides RSA Moduli belonging to '81.209.12.243 (ssh-rsa key from 81.209.12.243 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (da243.netikka.fi. FI 12)
deedbot: http://phuctor.nosuchlabs.com/gpgkey/DA87978CF6FFCF25718681CFA15297476FC99BCEF0F5FB9DE3EAA5DC3326D5DA << Recent Phuctorings. - Phuctored: 1768...8957 divides RSA Moduli belonging to '81.209.12.243 (ssh-rsa key from 81.209.12.243 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (da243.netikka.fi. FI 12)
asciilifeform: ( the rsa operation, the one and only, is modular exponentiation. but it is made trivially from modular multiplication . )
a111: Logged on 2017-08-10 19:45 asciilifeform: forn00bz: an, e.g., rsa modexp, in ffa, must be representable by a long roll of paper, on it are ops for ordinary 4function calculator, with very patient slave. and roll ONLY ROLLS FORWARD and has finite # of instructions on it, known in advance when you decide the ffa width.
deedbot: http://phuctor.nosuchlabs.com/gpgkey/B6814796AE3212BD73F5B32E70E118605F34DD740C3B26CB8D0DCC63037A1871 << Recent Phuctorings. - Phuctored: 1328...6593 divides RSA Moduli belonging to '91.109.28.91 (ssh-rsa key from 91.109.28.91 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (s322.deinprovider.de. DE)
deedbot: http://phuctor.nosuchlabs.com/gpgkey/B6814796AE3212BD73F5B32E70E118605F34DD740C3B26CB8D0DCC63037A1871 << Recent Phuctorings. - Phuctored: 1272...8187 divides RSA Moduli belonging to '91.109.28.91 (ssh-rsa key from 91.109.28.91 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (s322.deinprovider.de. DE)