Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Technology

Preview of New Block Cipher 232

flaws writes "Secure Science Corp. is offering a preview of one of the 3 ciphers they will be publishing througout the year. The CS2-128 cipher is a 128-bit block cipher with a 128 bit key. This cipher is proposed as a hardware alternative to AES, being that it is more efficient in hardware, simpler to implement, and comparably secure to AES-128. The preview of the CS2-128 cipher proposed is in html form and will be available in a published format at the end of April. At this time, requests are made for casual peer review and implementation. Secure Science will be offering a challenge at the end of April, introducing the cipher to the public. This ciphers implementation and usage will be offered in multiple hardware devices, such as wireless routers, cell-phones, and storage management hardware."
This discussion has been archived. No new comments can be posted.

Preview of New Block Cipher

Comments Filter:
  • by Anonymous Coward on Thursday March 24, 2005 @11:07PM (#12042559)
    he can beat neo now?
  • by Anonymous Coward on Thursday March 24, 2005 @11:09PM (#12042561)
    MD5 of article text: 79592dc553067bfafaa07086c07d2c8a
  • by Anonymous Coward on Thursday March 24, 2005 @11:09PM (#12042564)
    Hello,

    Recently I noticed that my teenage son Ezekiel had begun to encrypt
    his emails with a program called PGP. I was concerned because I'd
    always covertly monitored their email for any hints of illegal
    activity, drug use or interest in the occult - some of his classmates
    have begun playing Dungeons and Dragons and listening to KISS. Since
    Ezekiel was now using PGP, his activites were hidden from me!

    Additionally, I also overheard him talking of using a program called
    Stegasaurus to embed secret information into normal-looking pictures.
    Terrified that my son might be speaking in some sort of sinful code, I
    immediately grounded him for a month. He was only allowed to go to
    school and Bible study.

    Anyways, I've done several days worth of research on this and
    discovered a few things about PGP that I'd like to share with the
    readers of these newsgroups. To begin with, I realized that many of
    the claims made by the creators of PGP are blatently false. Although I
    do not have a background in mathematics (I have an AA in Photography)
    I was easily able to rebuild Ezekiel's private key via his public key
    and one of his encrypted messages.

    Of course I am above-average in intelligence, but PGP is supposedly
    unbreakable! Perhaps crytogrophers aren't as smart as they believe?
    Fortunately in this case Ezekiel was just discussing a girl he met in
    school - a situation I harshly reprimanded him for. However, while PGP
    may be a program with flaws, it got me thinking about other programs.
    Perhaps someone will construct a PGP-like program that cannot be so
    easily broken; one that would take days of computer time to hack!

    My concern with a program like this is that people who use
    cryptography always do so because they have something to hide. A sense
    of guilt and shame seems to drive them. They know that they are doing
    something wrong and desperately want to hide it from the eyes of the
    world (although hiding it from the eyes of God is another matter!
    LOL!)

    A study recently released by the Institute for Family Computing
    revealed that the top three uses of cryptography were for 1)
    "terrorist-related activity" 2) pedophillia and 3) drug abuse. In fact
    as far as I can tell, no legitimate use was on the top ten at all!

    What scares me about this is that law-enforcement agencies will be
    unable to sift through email to find people who are breaking the law,
    or otherwise engaged in suspicious activity. At a time when our nation
    is under siege, I find it disturbing that people are working on
    developing cryptography that cannot be broken, even by our protectors
    in the FBI and CIA! Only those with something to hide truly need
    cryptography.

    Thus I urge cryptogrophers world wide to refrain from working on such
    programs, until our nation is no longer at war. I would ask those of
    other countries to respect our right to self-defense and aid us in our
    time of trouble. Your cryptographic skills can be better put to use
    trying to find terrorists than to assist them.
  • by MajorDick ( 735308 ) on Thursday March 24, 2005 @11:15PM (#12042609)
    Well, I called up DVD Jon , and within about 15 minutes he had a working exploit for the cipher.

    Oh well off to the next

    Nothing to see here already been cracked...move along....

  • by Anonymous Coward on Thursday March 24, 2005 @11:18PM (#12042628)
    I can't tell if you're trolling or not. Good one, if you are. Otherwise you're an idiot. :-)

    "A little from column A, a little from column B". Personally I think he's half idiot and half trolling for his fucking conga line free mac sig.

  • by Anonymous Coward on Thursday March 24, 2005 @11:27PM (#12042703)
    mod parent funny : +5!
  • You are right. Nevermind what I said. Buy the snake oil, it has a better track record.
  • by maroonhat ( 845773 ) on Thursday March 24, 2005 @11:39PM (#12042784)
    Is your son a computer hacker? [adequacy.org]

    ...im quite sorry a site like the one my link points to exists but its hilarious none the less
  • by krishn_dev ( 781739 ) on Friday March 25, 2005 @12:12AM (#12042951)
    No... I cant ping him yet. :-D
  • by Anonymous Coward on Friday March 25, 2005 @12:30AM (#12043032)
    To: flaws@securescience.com
    From: bruce@schneier.com
    Subject: Peer Review

    Flaws,
    Peer review some algorithm you just made up? Wow. Definitely not Snake-oil. Gimme a break.

    Bruce

    >Bruce,
    >We just came up with a 1337 crypto algo. You wanna peer review it for us?
    >Peace,
    >flaws
  • by Jah-Wren Ryel ( 80510 ) on Friday March 25, 2005 @01:09AM (#12043325)
    Dude, I don't know what they call it in China, but over here, that's what's known as a joke, son! A joke!

    Your truly,
    Fog Horn Leghorn
  • by BobNET ( 119675 ) on Friday March 25, 2005 @02:26AM (#12043768)

    Recently I noticed that my teenage son Ezekiel had begun to encrypt
    his emails with a program called PGP.

    If my parents named me Ezekiel, I'd try to hide that fact too.

  • by ManuelKelly ( 446655 ) on Friday March 25, 2005 @03:26AM (#12044061)
    This sounds like someone has finally found a use for all of those AOL cd's. A completely new set of pads delivered to your door monthly.
  • by Big_Oh ( 623570 ) on Friday March 25, 2005 @04:09AM (#12044256) Homepage
    "...This implies that cryptography may come ultimately from the infantile sexual pleasure that children obtain from the muscle tension of retaining the feces." From Kahn's "The Codebreakers".
  • Great! (Score:1, Funny)

    by tasadar24 ( 845665 ) on Friday March 25, 2005 @06:33AM (#12044672) Homepage
    Finally I can change to something better then rot-13!
  • by Ant2 ( 252143 ) on Friday March 25, 2005 @09:34AM (#12045224)
    So then, why are we posting this anonymously? Exactly what is it YOU are hiding? Is it SATAN?
  • by abb3w ( 696381 ) on Friday March 25, 2005 @11:53AM (#12046390) Journal
    Although Ido not have a background in mathematics (I have an AA in Photography) I was easily able to rebuild Ezekiel's private key via his public key and one of his encrypted messages. Of course I am above-average in intelligence, but PGP is supposedly unbreakable!

    As the United States has known since its founding, all cryptographic algorithms (even the one-time pad) are vulnerable to attack via divine revelation, even in the absense of the ciphertext itself. Those able to take advantage of this regularly are a pearl without price in the intelligence community.

    Your services have immense potential value for your country in the hunt for terrorists like Osama Bin Laden. If you'd like a circular describing opportunities for employment with the NSA, just pick up your phone, call your mother, and ask for one.

  • by Anonymous Coward on Friday March 25, 2005 @12:02PM (#12046466)
    Not to mention "Solitaire"

BLISS is ignorance.

Working...