From: Tom St Denis on
On Sep 23, 9:23 am, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote:
> Tom St Denis wrote:
> > .....   For example, take a
> > simple cipher
>
> > C = sbox[P xor K]
>
> > Where K is random.  Even if sbox[] were known [and bijective] the
> > output would still be "random" provided that K is random.  
>
> That seems to be fairly clear. But if the sbox is known, there seems
> to be no purpose to use it at all (for crypto), isn't it?

That's a stupid question, even from you.

The sbox is a design principle of the cipher, it's ASSUMED to be
public knowledge. I can't say this in any more stressful fashion so
I'll cruise on caps...

ALL OF MODERN CRYPTOGRAPHY'S SECURITY IS [IDEALLY] BASED ON THE
PREMISE THAT THE CIPHER OR ALGORITHM IS PUBLICLY DISCLOSED AND THAT
THE KEY(S) REMAIN SECRET.

Tom
From: Greg Rose on
In article <h9d82c$6tj$00$1(a)news.t-online.com>,
Mok-Kong Shen <mok-kong.shen(a)t-online.de> wrote:
>Maaartin wrote:
>
>> Did you tried it? What's the probability of such a matrix being
>> regular? I'd guess, quite low, but I'm not sure.
>> Nonetheless, designing an algorithm making regular matrices should be
>> very easy.
>
>I am not sure that one could have an algorithm that gives a
>non-singular matrix having columns with 50% 0 and 50% 1
>(quite randomly) and yet without having to go through an iteration
>process (i.e. here trial and error). Simply getting an arbitrarily
>quite random appearing non-singular matrix is of course entirely
>trivial.

I have come up with an algorithm to ensure that
such a matrix is invertible, with about 5 minutes
of thought. (Start with an identity matrix, and
for each column, add other columns until they have
the desired number of ones. It must terminate and
can't be terribly inefficient, I don't think.)

However I must say that I'm depressed that
Mok-Kong Shen is back. In my opinion he's the
worst of the trolls ever to hit sci.crypt, because
he absolutely refuses to do independent thinking,
always apologizes for refusing to learn, and yet
sounds so plausible.

So I will no longer reply to him, and I urge others
not to, too.

Greg.
--
Greg Rose
232B EC8F 44C6 C853 D68F E107 E6BF CD2F 1081 A37C
From: Mok-Kong Shen on
Tom St Denis wrote:
> On Sep 23, 9:23 am, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote:
>> Tom St Denis wrote:
>>> ..... For example, take a
>>> simple cipher
>>> C = sbox[P xor K]
>>> Where K is random. Even if sbox[] were known [and bijective] the
>>> output would still be "random" provided that K is random.
>> That seems to be fairly clear. But if the sbox is known, there seems
>> to be no purpose to use it at all (for crypto), isn't it?
>
> That's a stupid question, even from you.
>
> The sbox is a design principle of the cipher, it's ASSUMED to be
> public knowledge. I can't say this in any more stressful fashion so
> I'll cruise on caps...
>
> ALL OF MODERN CRYPTOGRAPHY'S SECURITY IS [IDEALLY] BASED ON THE
> PREMISE THAT THE CIPHER OR ALGORITHM IS PUBLICLY DISCLOSED AND THAT
> THE KEY(S) REMAIN SECRET.

No. I was criticizing your stating that's a cipher. I mean, since the
opponent knows the Sbox, he can strip it right away, so the "existence"
of the sbox in the cipher serves no purpose (no designer would
add an absolutely redundant component). Saying C = P xor K is a an
example of a simple cipher is o.k. Do you get it?

M. K. Shen

From: Mok-Kong Shen on
Greg Rose wrote:
> Mok-Kong Shen wrote:

>> I am not sure that one could have an algorithm that gives a
>> non-singular matrix having columns with 50% 0 and 50% 1
>> (quite randomly) and yet without having to go through an iteration
>> process (i.e. here trial and error). Simply getting an arbitrarily
>> quite random appearing non-singular matrix is of course entirely
>> trivial.
>
> I have come up with an algorithm to ensure that
> such a matrix is invertible, with about 5 minutes
> of thought. (Start with an identity matrix, and
> for each column, add other columns until they have
> the desired number of ones. It must terminate and
> can't be terribly inefficient, I don't think.)

I am fairly sure that that wouldn't work. In the following,
I started with a 4*4 identity matrix. I did 3 steps to achieve
50% 0 and 50% 1 in the first 3 columns, but then I am stuck.
There is evidently no way to get the 4-th column to satisfy
the required condition.

1000 1000 1000 1000
0100 1100 1100 1100
0010 0010 0110 0110
0001 0001 0001 0011

> However I must say that I'm depressed that
> Mok-Kong Shen is back. In my opinion he's the
> worst of the trolls ever to hit sci.crypt, because
> he absolutely refuses to do independent thinking,
> always apologizes for refusing to learn, and yet
> sounds so plausible.
>
> So I will no longer reply to him, and I urge others
> not to, too.

I hope that you, as a good scientist, would "valuate" science
over any personal feelings/opinions and therefore would nonetheless
(at least in this "special" case) answer to my demonstration above,
because it very clearly shows that your modified idea of
constructing an non-singular matrix satsifying my stated condition
cannot work at all.

Of course, I would also be grateful, if anyone of the group
(in your place) could show that your idea indeed works, in case
I am wrong.

Thanks.

M. K. Shen
-----------------------------------------------------------------

My favourite citation for scientific discussions:

Was sich ueberhaupt sagen laesst, laesst sich klar sagen;

und wovon man nicht sprechen kann, darueber muss man schweigen.

L. Wittgenstein.
From: Unruh on
Mok-Kong Shen <mok-kong.shen(a)t-online.de> writes:

>Tom St Denis wrote:
>> On Sep 23, 9:23 am, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote:
>>> Tom St Denis wrote:
>>>> ..... For example, take a
>>>> simple cipher
>>>> C = sbox[P xor K]
>>>> Where K is random. Even if sbox[] were known [and bijective] the
>>>> output would still be "random" provided that K is random.
>>> That seems to be fairly clear. But if the sbox is known, there seems
>>> to be no purpose to use it at all (for crypto), isn't it?
>>
>> That's a stupid question, even from you.
>>
>> The sbox is a design principle of the cipher, it's ASSUMED to be
>> public knowledge. I can't say this in any more stressful fashion so
>> I'll cruise on caps...
>>
>> ALL OF MODERN CRYPTOGRAPHY'S SECURITY IS [IDEALLY] BASED ON THE
>> PREMISE THAT THE CIPHER OR ALGORITHM IS PUBLICLY DISCLOSED AND THAT
>> THE KEY(S) REMAIN SECRET.

>No. I was criticizing your stating that's a cipher. I mean, since the
>opponent knows the Sbox, he can strip it right away, so the "existence"
>of the sbox in the cipher serves no purpose (no designer would
>add an absolutely redundant component). Saying C = P xor K is a an
>example of a simple cipher is o.k. Do you get it?

No, you cannot strip it away. You maybe could IF it were "bijective" Ie
a simple permuation, but and Sbox is a non-linear many to one map. You
cannot undo it. For every output there are many inputs. The cypher as a
whole is one to one, but the subsets of it are not. Ie, given the
outputs of the sbox, you do not know what the inputs are.
Thus you cannot strip it away.



>M. K. Shen

First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10
Prev: RSA key size and safety
Next: MBOL AAOT MBCL LUAT MKAT