On 23/10/2011 6:04 PM, adacrypt wrote:
> On Oct 23, 8:36 am, Mark Murray<
w.h.o...@example.com> wrote:
>> On 23/10/2011 05:52, adacrypt wrote:
>>
>>> People is plural - there is only one person being jeopardised, that's
>>> Alice - This fiasco has spawned more red herrings than enough
>>
>> Rubbish. If Alice is compromised, then so is Bob. Once their
>> key material is exposed, it is exposed forever.
>>
>> Do this honestly this time; send PM the files he asked for BUT WITH
>> SECRET KEY MATERIAL!!!!
>>
>> Your parameters aren't secret; you have said many times that they
>> may be sent in the clear; only the vector tables are secret.
>>
>>> That might be the only thing to be claimed out of this faisco - Pm
>>> simulated that situation and my cipher survived.
>>
>> PM used your caipher as you told him to and it failed, and he
>> explained how it failed.
>>
>>> Because something appeared in wikipedia that doesnt make it a theorem.
>>
>> No, but its evidence.
>>
>>> I treat everything I read there as just having only temporary
>>> scientific credibility.
>>
>> Rubbish. You ignore facts.
>>
>>> What you say implies that AES and RSA may have already been broken in
>>> isolated cases that we know nothing about.
>>
>> Its (in theory) possible that large government organizations like
>> NSA or GCHQ have broken these. They ain't telling.
>>
>>> This unfortunate episode should never have happened the way it did - I
>>> cannot ascribe any credibility to it as an experiment and it has been
>>> a badly concieved parody of an adversary at work that has been a waste
>>> of time.
>>
>> The only parody of an adversary here is you and your refusal to play
>> fair.
>>
>> HERE IT IS:
>>
>> 1) Regenerate your secret vector tables. Use a computer to do it so
>> you can do it again. Ask someone to do this if you can't; it is
>> REALLY easy.
>>
>> 2) Generate the files that PM asked for INCLUDING the parameters that
>> he asked for (you swear that they are not relevant to the cipher
>> anyway!)
>>
>> 3) Send this AND NOT THE SECRET STUFF to PM.
>>
>> 4) Stop whining about PM being "in your database" when thats all
>> you'll give him!!
>>
>>> I think it should be conducted all over again in a few weeks when I
>>> can table a new database that PM will not be handed on a plate this
>>> time to exploit as he did (not).
>>
>> Why does it take a few weks to table a new database? This thing is
>> supposed to be easy to use? Are you doing it by hand? Can't you
>> program? Or are you just chicken?
>>
>> A half-competent newbie ought to be able to do this in under a day.
>>
>>> That has become a waste of time that is worthless to me or to anybody
>>> - I am not claiming anything from it a a test because it was
>>> worthless.
>>
>> I get the impression that you will declare orthless anything that you
>> don't like. PM didn't require access to your numbers to formulate his
>> attack; he just needed what you did with them, and this was easily
>> broken.
>>
>>> Let someone in authority stake out what is an acceptable simulation of
>>> an attack by an adversary and I will provide the files for the model.
>>
>> Read a book on cryptananlysis for crying out loud! Provide _IN_PUBLIC_
>> a realistic "dialogue" between Alice and Bob. Give a few cribs (they
>> will always be available, and your cipher MUST be able to survive them)
>> and stop trying to rig the result.
>>
>>> There must be some criteria about this in the crypto establishment
>>> somewhere that can be used as a standard test reference.
>>
>> YES!! Start reading books! Its all there!
>>
>>> It is truly in my interests to cooperate in such a test because it
>>> will be a small piece of credility to others.
>>
>> YES!! So start doing so!!
>>
>>> I await the next development with eager interest from anyone.
>>
>> NO!! YOU make the next development! It's YOU who aren't doing his bit!
>>
>> Supply an honest challenge for a start!
>>
>> M
>> --
>> Mark "No Nickname" Murray
>> Notable nebbish, extreme generalist.
>
> I can't - he is inside my database and can run my program - if I give
> him any more information that you suggest he will be able to key in
> the correct scrambling parameters, run the program and decrypt the
> secret message that I sent him. - how stupid would that be?
>
> Its time to end this farce now and wait for a new appraisal in a fresh
> test that does not hand him my secure database.
>
> - adacrypt
Perhaps it will help to think of this situation in an analogous real
world way. A cipher performs on data essentially the same function as a
lock performs on a door. Heaps of people in the street/suburb/country
use the exact same lock. Even the thief can buy one and study it. The
thief can pull it apart, examine and measure it in exact detail. The
thief can even practice breaking simpler versions of the lock to build
expertise. The thief knows absolutely everything about your lock and can
practice an infinite number of times, but your lock is still secure
because the *only* *thing* the thief does not know is the key. It is
exactly the same way with strong ciphers - especially if you intend for
it to be widely used.
You do realise that if you had used AES instead of your stuff PM would
have had the entire, complete and exact details as well. If this
identical attack, which you consider unfair, was inflicted on AES it
would have survived unscathed, where as your cipher is cracked wide
open. It is an elegant proof that AES is much stronger than your cipher,
no?