5. Cryptology


THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,

1994-09-10, Copyright Timothy C. May. All rights reserved. See the detailed disclaimer. Use short sections under "fair use" provisions, with appropriate credit, but don't put your name on my words.

5.2. SUMMARY: Cryptology

5.2.1. Main Points

5.2.2. Connections to Other Sections

5.2.3. Where to Find Additional Information

5.2.4. Miscellaneous Comments

5.3. What this FAQ Section Will Not Cover

5.3.1. Why a section on crypto when so many other sources exist?

5.3.2. NOTE: This section may remain disorganized, at least as compared to some of the later sections. Many excellent sources on crypto exist, including readily available FAQs (sci.crypt, RSADSI FAQ) and books. Schneier's books is especially recommended, and should be on every Cypherpunk's bookshelf.

5.4. Crypto Basics

5.4.1. "What is cryptology?"

5.4.3. What's the history of cryptology?

5.4.4. Major Classes of Crypto

5.4.5. Hardware vs. Software

5.4.6. "What are 'tamper-resistant modules' and why are they important?"

5.4.7. "What are "one way functions"?"

5.4.8. When did modern cryptology start?

5.4.9. What is public key cryptography?

5.4.10. Why is public key cryptography so important?

5.4.11. "Does possession of a key mean possession of identity?"

5.4.12. What are digital signatures?

5.4.13. Identity, Passports, Fiat-Shamir

5.4.14. Where else should I look?

5.4.15. Crypto, Technical

5.4.17. Other crypto and hash programs

5.4.18. RSA strength

5.4.19. Triple DES

5.4.20. Tamper-resistant modules (TRMs) (or tamper-responding)

5.4.21. "What are smart cards?"

5.5. Cryptology-Technical, Mathematical

5.5.1. Historical Cryptography

5.5.2. Public-key Systems--HISTORY

5.5.3. RSA and Alternatives to RSA

5.5.4. Digital Signatures

5.5.5. Randomness and incompressibility

5.5.6. Steganography: Methods for Hiding the Mere Existence of Encrypted Data

5.5.7. The Essential Impossibility of Breaking Modern Ciphers and Codes

5.5.8. Anonymous Transfers

5.5.9. Miscellaneous Abstract Ideas

5.5.10. Tamper-resistant modules (TRMs) (or tamper-responding)

5.6. Crypto Programs and Products

5.6.1. PGP, of course

5.6.2. "What about hardware chips for encryption?"

5.6.3. Carl Ellison's "tran" and mixing various ciphers in chains - "tran.shar is available at ftp.std.com:/pub/cme

5.6.4. The Blum-Blum-Shub RNG

5.6.5. the Blowfish cipher

5.7.1. "What is "blinding"?"

5.7.2. "Crypto protocols are often confusing. Is there a coherent theory of these things?"

5.7.3. The holder of a key is the person, basically

5.7.4. Strong crypto is helped by huge increases in processor power, networks

5.7.5. "What is the "Diffie-Hellman" protocol and why is it important?"

5.7.6. groups, multiple encryption, IDEA, DES, difficulties in analyzing

5.7.7. "Why and how is "randomness" tested?"

5.7.8. "Is it possible to tell if a file is encrypted?"

5.7.9. "Why not use CD-ROMs for one-time pads?"

5.8. The Nature of Cryptology

5.8.1. "What are the truly basic, core, primitive ideas of cryptology, crypto protocols, crypto anarchy, digital cash, and the things we deal with here?"

5.8.2. Crypto is about the creation and linking of private spaces...

5.8.3. The "Core" Ideas of Cryptology and What we Deal With

5.8.4. We don't seem to know the "deep theory" about why certain protocols "work." For example, why is "cut-and-choose," where Alice cuts and Bob chooses (as in fairly dividing a pie), such a fair system? Game theory has a lot to do with it. Payoff matrices, etc.

5.8.5. "Is it possible to create ciphers that are unbreakable in any amount of time with any amount of computer power?"

  1. Maybe there are really shortcuts to factoring. Certainly improvements in factoring methods will continue. (But of course these improvements are not things that convert factoring into a less than exponential-in-length problem...that is, factoring appears to remain "hard.")
  2. Maybe reversible computations (a la Landauer, Bennett, et. al.) actually work. Maybe this means a "factoring machine" can be built which takes a fixed, or very slowly growing, amount of energy.
  3. Maybe the quantum-mechanical idea of Shore is possible. (I doubt it, for various reasons.) I continue to find it useful to think of very large numbers as creating "force fields" or "bobbles" (a la Vinge) around data. A 5000-decimal-digit modulus is as close to being unbreakable as anything we'll see in this universe.

5.9. Practical Crypto

5.9.1. again, this stuff is covered in many of the FAQs on PGP and on security that are floating around...

5.9.2. "How long should crypto be valid for?"

5.9.3. "What about commercial encryption programs for protecting files?"

5.9.4. "What are some practical steps to take to improve security?"

5.9.5. Picking (and remembering) passwords

5.9.6. "How can I remember long passwords or passphrases?"

5.10. DES

5.10.1. on the design of DES

5.11. Breaking Ciphers

5.11.1. This is not a main Cypherpunks concern, for a variety of reasons (lots of work, special expertise, big machines, not a core area, ciphers always win in the long run). Breaking ciphers is something to consider, hence this brief section.

5.11.2. "What are the possible consequences of weaknesses in crypto systems?"

5.11.3. "What are the weakest places in ciphers, practically speaking?"

5.11.4. Birthday attacks

5.11.5. For example, at Crypto '94 it was reported in a rump session

(by Michael Wiener with Paul van Oorschot) that a machine to break the MD5 ciphers could be built for about $10 M (in 1994 dollars, of course) and could break MD5 in about 20 days. (This follows the 1993 paper on a similar machine to break DES.)

5.11.6. pkzip reported broken

5.11.7. Gaming attacks, where loopholes in a system are exploited

5.11.8. Diffie-Hellman key exchange vulnerabilities

5.11.9. Reverse engineering of ciphers

5.12. Loose Ends

5.12.1. "Chess Grandmaster Problem" and other Frauds and Spoofs


Revision #1
Created 23 June 2022 03:43:02 by c0mmando
Updated 23 June 2022 03:43:59 by c0mmando