From: Matt Giwer Area: Public Key Encryption To: All 25 Feb 95 03:32:10 Subject: OLD TIMES NOT FORGOTTEN UpdReq PGP is the rage and it just might be the encryption method for all seasons. However, some of the oldest methods certainly have some life in them, at least in computer simulations of them. For example, the Enigma Machine. Use the same concept but for each character use the 8 bit (or 7 or 6 bit) ASCII representation and have the transposition wheels at the bit level such that the bits are shuffled also. And of course at today's machine speeds have 8 (or 7 or 6) times as many wheels. Doing that the decryption time goes rapidly as there is no possible pattern in the resulting bits as there were in the "bytes". Using this approach it appears the objective would be the most efficient method of bit scrambling under the presumption there is a better one than a set of code wheels. Of course some pre-processing such as Huffman coding would make is more difficult to eliminate obvious combinations. This is another approach, simply multiple methods of encryption in which the order is non-stochastic. That is, the method have to be applied in the reverse order of application for successful decryption. The number of methods increases the decryption time by n! for each sequence of application. The obvious objection to this approach is that it requires precommunication of the method -- not quite. Note that Zimmer those is ZIPping under the concept that every little bit helps. The multiple coding method sequence can be transmitted that way and that would be applied to the PGP method. And the methods adds sequence of other methods can be true codes (method A then B then C then etc.) requiring only a one time agreement upon methods. There can also be a standard set of encryption routines made public and the sequence of usage transmitted by PGP. In any event, should there ever become a question as to PGP in any serious circumstance, what can be built upon it is n! greater. --- * RM 1.3 01261 * The Clintons abandoned Hope in 1953. The US in 1993. 201434369420143436942014343694201434369420143436942014343694718 From: Jeff Trowbridge Area: Public Key Encryption To: Bill Brown 26 Feb 95 09:31:50 Subject: pgp -ew command.com?? UpdReq -----BEGIN PGP SIGNED MESSAGE----- On (25 Feb 95) Bill Brown wrote to Jeff Trowbridge... BB> Hello Jeff, BB> Friday February 24 1995 17:49, Jeff Trowbridge wrote to Bill Brown: BB>> I can see it now, "There's a bug in PGP. I typed PGP -ew BB>> COMMAND.COM and now my machine won't boot." :) JT> I'm new to pgp, so what would typing that cause? BB> My first answer "should" be RTFM. (Read the fine manual.) BB> Encryption software can be a bit more complex than other varieties, BB> and it's important to know what you are and are not (but THINK you BB> are?) doing. Actually, I've read the manual often. It was just when I saw your original post I couldn't remember seeing anything regarding an -ew switch and a quick scan didn't turn it up either. :) BB> (One thing I WILL recommend learning is "PGP -h" which IS safe to BB> type. Go ahead, give it a try. :) That one can come in handy for BB> reminding you of the syntax of those commands you don't use on a BB> regular basis.) PGP -h and I are very good friends. :) BB> The "e" means Encrypt, and the "w" means Wipe out the original BB> (unencrypted version) from my drive. PGP -ew COMMAND.COM (for DOS BB> users) therefore means "Make sure the operating system can't find BB> itself in the future." That's probably why I didn't remember that. I manually delete the text files after I sign or encrypt them. Although the PGP -ew COMMAND.COM sounds like a good way if you needed to wipe out your hard drive in a hurry. :) Good thing I keep back ups of autoexec.bat and command.com. Those are probably the only 2 back ups I have, but I do have those :) Thanks, Jeff -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBL1C67XPq8B1oZhD9AQGDvQP9G1JREYHXTbcm6LH2Sp2dndVw6gUSxLa/ Ckcu9YU8VrEtwd343TDde1yU5HCjx5jA1ylxc3Nuj1JbkbY+AzSbmIiKsgbZnZ2R 7vqtHooK1QrFeZ8IpdIHo06G82UL5UzRbREH3Dy6BXDMSg1si/28PFivEbvwJZAj htyEDE1ZrMA= =oOQO -----END PGP SIGNATURE----- ... "Corrupt" is too harsh, I prefer the term "Ethically Challenged". 201434369420143436942014343694201434369420143436942014343694718 From: Bill Brown Area: Public Key Encryption To: L P 26 Feb 95 13:31:00 Subject: Something Is Clipping You UpdReq Hello L, Friday February 24 1995 07:52, L P wrote to Christopher Baker: LP> I took it out of "FidoNet Mode" for this message, and it looks OK LP> now, doesn't it? LP> ...--BEGIN PGP SIGNATURE-+--- LP> Version: 2.6.2 LP> ...--END PGP SIGNATURE-+--- Same as before. Bill Brown 201434369420143436942014343694201434369420143436942014343694718 From: Richard Dale Area: Public Key Encryption To: Shawn Mcmahon 25 Feb 95 12:27:10 Subject: Quotes as passphrase UpdReq SM>*Source, please. I don't think it is. It's called TEMPEST. You can get around it partially by shielding things like your monitor and keyboard cable. Look in an electronics magazine for an ad from Consumertronics in Alamagordo, NM. They have a bunch of "phreaking and hacking" stuff. I did something similar about 15 years ago. I used a Timex-Sinclair 1000 computer and was able to monitor it across the room on a portable TV due to the RF it generated. * 1st 2.00b #567 * If not for politicians, we wouldn't NEED assault rifles. 201434369420143436942014343694201434369420143436942014343694718 From: Gordon Campbell Area: Public Key Encryption To: Armando Ortiz 26 Feb 95 11:00:00 Subject: unauthorized info gatheri UpdReq -----BEGIN PGP SIGNED MESSAGE----- On (19 Feb 95) Armando Ortiz wrote to Gordon Campbell... AO> The only nut here is the one doing the accusing. I'm not so sure he's a nut. AO> I have made my requests. If people don't like them, too bad. AO> Rules are rules in my eyes and I have no intention on making any AO> exceptions. What the group here is trying to tell you (albeit a trifle nastily) is that if you stick to your restrictions (home address, home ph. #, US residents only) you're not going to get a proper representative sample of crypto users for your beta team. I think you'd be wise to re-think some of the requirements. Cheers, .....G -----BEGIN PGP SIGNATURE----- Version: 2.6.i Comment: Help! Help! The paranoids are after me! iQCVAwUBL1CmEoomCDt60qk9AQHeAAP/a11ZcFIWFgPRxV1X2IEIlVysjz3RXKDw zgri+MNMgTY3Xfke0coAheyHSoANlzjVieqgmumQ3gKmmhZgKZWhFXD7vo/nu6qq YVbGfr8diejFOfLGbqVnHqqzp5svZsYWPD7mrkfS9kUhUuJQUim+Zfkc8TqAovhN aDJyGuJa1F0= =wNmp -----END PGP SIGNATURE----- ... "I'll be Bach." - Johann Sebastian Schwarzenegger 201434369420143436942014343694201434369420143436942014343694718 From: Dave Hodgins Area: Public Key Encryption To: Christopher Baker 27 Feb 95 17:40:00 Subject: secdev12??? UpdReq On (20 Feb 95) Christopher Baker wrote to Mike Lenker... CB> In a message dated: 18 Feb 95, Mike Lenker was quoted as saying: ML> Can someone list a source for SECDEV, please? I'm a happy user of CB> SECDEV12.ZIP is available here. that's the last one i've seen. Secure device 1.2 was released in April 94. Secure device 1.3 was released in May 94. Secure device 1.4 was released in August 94. I'm still using 1.3, as I had some problems with 1.4 (I don't remember right now, what the problems were). If you have an internet address, I can send you a copy of secdev13.zip (111,950 bytes), and secdev14.zip (136,847 bytes). Regards, Dave Hodgins. --- * RM 1.3 00820 * Internet:Dave.Hodgins@Canrem.com Rime->118 Fido(1:229/15) 201434369420143436942014343694201434369420143436942014343694718 From: jason carr Area: Public Key Encryption To: Christopher Baker 27 Feb 95 17:42:40 Subject: Re: Re: unauthorized info gat UpdReq -----BEGIN PGP SIGNED MESSAGE----- Christopher Baker wrote in a message to Armando Ortiz: CB> if your program doesn't encrypt, it isn't subject to ITAR CB> restrictions so you've got nothing to worry about. CB> does it encrypt? Only if you key in your Date of Birth, Mailing address, SSN, and a blood sample for each plaintext you want encrypted. :P jason ... Bad command. Bad, bad command! Sit! Stay! Staaay. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP_ECHO: CypherEcho to the gods... iQCVAwUBL1J/5EjhGzlN9lCZAQG//gP+O4J9av85oXczxDROvWo3kCvuLgnzlrut 2BlXsAACcSCW/4NwlNPmePPGV2AIuYv3qZ6PcbHlIb6M7bHYQcqu3cWoZ9NPYgFO ZMRhdd9meUjIuaYqwk9hbxphX4YxFeQDF2K5JwaWDUswFCAQRbfP88fV1hK3JSRG nrMhjhLqKL8= =xEna -----END PGP SIGNATURE----- ... Key fingerprint = 60 97 B2 AE 7D 90 11 2F 05 1C 35 98 E9 B9 83 61 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: Jay Blair 27 Feb 95 14:09:06 Subject: Re: Hello UpdReq -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 25 Feb 95, Jay Blair was quoted as saying: JB> Do You Have PGP 2.6.2 Then For FREQ? I Would Like To Grab JB> A Copy ASAP Then! I had no idea I was behind the times. freq PGP for the DOS version or PGPOS2 for the OS/2 version of 2.6.2. this offer good only in the U.S. and Canada. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP 2.6.2 is LEGAL in Zone 1! So USE it! [grin] iQCVAwUBL1IjVcsQPBL4miT5AQFPFgQAhl25DaJ+/esS0IM3EzG1yuUrh08OLcWu dLp/WpmntLo54PAaD6zSNAO2sp7bvbYw2Oy4jzyqdStogrXyX86PIUHdey3e1Efo DGe+vAZX0ia1W5eRq7EUG7phBKY2NbQ2ob0Ka8RKjGRp/WgrfkoP6eR02raHn/0a BdY7anrt808= =ADUE -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Richard Dale Area: Public Key Encryption To: Matt Giwer 27 Feb 95 12:19:10 Subject: OLD TIMES NOT FORGOTTEN UpdReq -----BEGIN PGP MESSAGE----- Version: 2.6.2 Comment: -[ Privacy through random acts of encryption ]- hIwD4NilxXzfR5UBA/9c0V0vjO2AxL8+Ed2GaIK1wgFs9qJrkY7N4ypK3kB7STqw BUIR2e36CwBodEYKZBsT2UbQoEGjL8Dnqkrnzi1Fmjkbl+sBPqhlvq3zOJa7HO6o l2ACiES+eB+NwHRazX7PjHT7HbcHmTCdhv1dMizYRO96r5hvcmgq2YJq1hzFTqYA AAlPA/4pgDZQy1n4Q8DClDkxnxoaHh8lhDGbW3xbyH6KzjwCROusXopRyDnjx6FM dl4JHYexsgOaJRiU6mpdGUXEvjzj+BKxPsgIgDT7256eCPk6UXnbGU1jW0nmTkY4 f45A8ueClrCfyHtzFPNPFp6poa3Nqg25yI4GRK//aPYIad07R8k3DKPLB4ZeA4Up rPfh3f/AcFQcXCwwrO5dlSlzih64fNf2s/Ucwp5J//EC6yTmTV/FlX5pIBo0pWYD fsjk2NpBPoRexv6X+t/8ty2mm5bldQCIzJWPo7yr7KlVRERLIYVdU7wt910mZnJ1 Mu5pnBxaVOEYGDXPJMsZnYeIUIKX0MfwbB7o4KMT0YdDgJVcWjua9/6gHGqxLzJr TLS0mEaGjyngspWBFZBxZkFbTB1I2h0B5viWoP/jLmR63zkHEewg7VdeKRTzPsO2 qwrZYygVlM285vZZfMW3aswsdMGsM+xXVtzHCjynkuRIY7HgJmuXBUNmirvJmlrv ahAygTLalrmyTiRmLkEIPsZZ6Jm1ttqQ/msPWn6u1hyFvZC3SBzwBg7t+1VAmC1V xT2ZqU758Ij9hpgFPwxoh5iALG31mpqmy5OD7xBZxRyzaZp7YDnvo0FvTFRcsuP7 7nJMaw22d40VIYjffhfKBY7gUrs+znJaFON1kecsif0OXiTM28RDgSlCX5fpuSF/ 18Tmwxwsfl+ge4EF6yxy8YBQRtpH6Wne5eAMWn46kY1IH0f0nbOM5MEhnXyiW4an 6AV4ouvHDanmnRaEYfK+ODOTi1fILn7w6BgQ+9SnJwbT3gUPe3wkVfb8fWuo73ji EkCNw2hSg13u5Tdtfp+LgiqfjAEamG8A0u9PYWCMUAqGT3HScdfywPSFddyKbImU RIeYMFvM1GO2YUjVYXAZ2iat4VpmmhSxOKHqY05xnQJSQIB53qbIasbeXhhTQlFs mYBTAYp0GeTdKZtXEX1vEwPhaXK8D/9HXeR2DJRMB/qOAM+2uDTTXUIg/uQ9KET3 KvkWq9S6EY31GANSjWCbBRo/kPOgZMbq8yvNqTWhky6TLK6g4JNNDfc9TrfRwx5b WOoJv5AQ7mpoeqdFf/2olk66RpsFpchK1rNDJYaNmYneoz+uSZGRWaCo65PpZzND FtenGEXuexCXkNqd1y6Z1JGdl+KhgrP7AwUjZIeUF2geaT3aE2jiVyDZFr/XWT/H sg/GghZejHe/nUDT4Xrd2fdfOv02YtVeY/neZ3JsdjBP/XbIVl1y58LvRFnNyeSC +G0NNFK5MQ2FXRKQ+ZfD1e5LABR3ZVBlr+3E4h5E+68EJgnT0fAMbC2A2asea7gu a8hQCozsYk2OMMkRdJj9maVQE8vkvu//a/8DbT8YhVcUWhJ5hxWlsvIkhWsP5D/h xiF1+FyCjOG9PUydi3gGrv5/LTVL/tXCuU7u/hkqAqB8UUFsLcX+6thlmMiMPFse cjdCS7I5aUIBEQeo2Mq+9u6xOZsHGosYZ5W7GGFnqBLDIzhjgwYUSI/Uwd/ELt9y Ww3PrLRDrN770oT2iYW7yjf8OOWkgNHa4aBRaYxtLeE3O2h2MhvdfLJQD46Yfuao NPbKZ50OHgr9akvWKkyO/gh4VdfErhi9XbMJAWb0kgqwgllMSLKq69Kz9Gt/F6C2 bTrM6F8DVWhkkx6X3Ucehow6t6lIhywCPQrzAyBTRgCqqyh3LKfUnr9gom2jD/rH tgbRPpKYJYZUNmHLobD+8h3SAMH6saBF8fYdAuI6A7OD8AztWtx6xpYt7250WuCx ew3A7OmquRIbCHIr+9uO5VeJlD/iY1VDM7q5jzgNNCK+kWGBZb/DUu0bpbCoynpM aE/zGSEUJIFVDcICbxB7s5zu62uaChH7ybmnK14dixKF1Vp4jzY6pTH7Ni9D5EEK mxdVDBOlnzyAqN6eZ2uDrFXjQWYIKHDkJUIJrq6vTS+dx1wz7mWNoQEMp74iSp4h /jxVf66e3yvCJ/EHkakcMaDexZib/90AnxSCDnNUKafbM9UuhRCWpls0gLDwtZL6 aVQTy94CuXywaW5n0rrY5HKN+ygzPqWCuqG4ETAYzrISpGxpT8aoQY4Z7p4YbMYH M5Yr8MIuv3sisLv09P+Q/T9TV59V4lQPLJP4ZZQusH1d2CjRpTOJBcWm+k743ir5 /MqPDi5N4TAk7YMu+l54aK3TAGf05tl/9qB/ry9BqPKxYZmDXQhI2aI0RzKH7IcC q9zTRoEf/ox+E8uzM/twGlQJYxenKAB7PjoLEe+pYvGJA7vePXEQii2KnXoyDvsO UtGdhlqDQpmNRGjCH7wunR01S0bYC/Jvu60lfF1/oM8dA2qS9WY6bS7szKUiqlhF nPMPfP9e6xPkZp/z3gWq4kZNzLsapNaTktW1rsry8Izo2JHo2nDYIIF/lUHj9FdR brRKIe26olXc0UfLJ1FxYdXu56co9sAUY5H+SFJP2J6HjKBe/FLQhx9NlFfqsyqT n9jqd2kw+Z+4T86UqntQVPK5Kwt/9G86VZR2tBW6L67Z/HN46GXrMTb/R7+ess73 NgvlYgUARJzx9cV3Re8QkpO/ibmzsY33K6fHnxH5wCjDgTdmeBwmdIzEAPrSab0H nExs5Gy9INLuXgjflBCsxvwdwiBYHcSmnNcdAPi2WMH+hJnWnNnBSF4+nF0+W+EU rvlVp66MwwJHmFJRwZPl4r2okbQDRXz1Lwfs5C6mEk1YPO7ZJsVymcZSWk3lHYja e6CI3v1FGU/SYTZ3pUtRQd6KXJCafraGkf6iGja5QbeWTDjg83rqy1NFsCDWhr5f YLi8MUMS6gas6tH8BElw0CjJ3GFaAPdQEV2pxS7id4ZWgaqyM4OHZvx+09j+Pkuu W5X8+uHkypaWoo1OXCv27yFhnqX+//ctqhpSzR3QBExBmvPaWytKpvXjoq11uxwW P0p73NL52i0oSVeJq3Z6rnusMdyuDTqIZwJNu+wOuir3MrhYuENCHqdmCgDI9+5r Mafci1Lf/VYI+EcHNsMtA4LkEybQ14CGQuzA2ZwGNQKsR2PYPsRCcPB31jU/8+jQ p0sLgjUhRZn7TLNhpx+KXetUJqiYo48j7voVeEHCOrejvNjb7obnyK2X79hO8skO CHqq8DEvF3oovqY6fhO8xxzW8yqwZK//MDDhE7z3skrZoA== =xdlB -----END PGP MESSAGE----- * 1st 2.00b #567 * Sieg Heillary! Sieg Heillary! Sieg Heillary! 201434369420143436942014343694201434369420143436942014343694718 From: Doug Muth Area: Public Key Encryption To: Christopher Baker 27 Feb 95 20:27:00 Subject: Re: secdev12??? UpdReq -----BEGIN PGP SIGNED MESSAGE----- Greetings Christopher Baker! JT> I came into this thread late, so my question is what kind of JT> program is SECDEV12? CB> SecureDevice is a device-driver that will help you keep your private CB> data private. It creates 'extra drives' on your system that are CB> accessible just like normal disk drives, but everything you transfer to CB> the volume will be encrypted using the IDEA encryption algorithm, and CB> when you transfer data from the volume it will be automatically CB> decrypted. The encryption/decryption mechanism is transparant to DOS CB> and other application programs. SECDEV sounds interesting, where can I get a copy? Thanks, Doug.... -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: My PGP key is requestable from the keyservers on the Internet. iQCVAwUBL1J8Fh0LJlIsPN1JAQEvvgP/XG8jTsRmoadri96EsS6VWDpkP+EAeYOb xg3zivkGBXd9tA6kAEUJYtvWewYvgm3S4tNNupuT1x6MmuIcs9rHEPh9fYHF+ABe sUW7b4J7OcLaCZyqtRpHvMfvPOfWkXgQOfFv8fN4bRkoEQetPBgU9pg0wKxNtYWo CePZCGQgGXM= =Bh3U -----END PGP SIGNATURE----- ~~~ PGPLoad 1.2 -[UNREGISTERED]- ... AIDS is a virus; Bill Clinton is a punishment from God! ___ Blue Wave/QWK v2.12 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: Jeff Trowbridge 1 Mar 95 01:58:04 Subject: pgp -ew command.com?? UpdReq Despite the stern warnings of the tribal elders, Jeff Trowbridge said this to Bill Brown: JT> Actually, I've read the manual often. It was just when I saw your JT> original post I couldn't remember seeing anything regarding an -ew JT> switch and a quick scan didn't turn it up either. :) There is no "-ew" switch. There is, however, a -e switch and a -w switch. -ew invokes both. Most MSDOS and OS/2 programs work that way; as do Unix programs, and probably several other operating systems using command-line arguments. 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: Richard Dale 1 Mar 95 01:59:22 Subject: Quotes as passphrase UpdReq Despite the stern warnings of the tribal elders, Richard Dale said this to Shawn Mcmahon: RD> It's called TEMPEST. You can get around it partially by shielding RD> things like your monitor and keyboard cable. I know lots about TEMPEST shielding, Richard. And nothing I've ever read about it indicated that there was ANY need to shield one's CPU. Please, if you're going to enter the conversation, *READ* the messages to which you're replying. 201434369420143436942014343694201434369420143436942014343694718 From: Bill Brown Area: Public Key Encryption To: Jeff Trowbridge 27 Feb 95 14:16:00 Subject: pgp -ew command.com?? UpdReq -----BEGIN PGP SIGNED MESSAGE----- Hello Jeff, Sunday February 26 1995 09:31, Jeff Trowbridge wrote to Bill Brown: BB>> The "e" means Encrypt, and the "w" means Wipe out the original BB>> (unencrypted version) from my drive. JT> That's probably why I didn't remember that. I manually delete the JT> text files after I sign or encrypt them. Depending on your operating system, chances are that (Are you sitting down?) that DOESN'T delete the files. What it does is mark those disk sectors as "available" which means that you MIGHT overwrite them with something new in the future. Anyone getting their hands on that disk (floppy OR hard drive) can most likely "undelete" them, using a variety of tools. The -w Wipe option, actually overwrites the data in the sectors with "junk" data, as well as deallocating the sectors. It's a bit more secure than just the delete command most operating systems use. JT> Although the PGP -ew COMMAND.COM sounds like a good way if you needed JT> to wipe out your hard drive in a hurry. :) Well, it's pretty good at keeping YOU from getting to it easily at least. :) It would do very little to prevent, say ME, from getting to it, if I had physical possession. (I'm a consultant, so I need to know a trick or two for when people DO goof up.) For that matter, YOU could get at it with something as simple as a bootable floppy, come to think of it. No fancy tools at all. JT> Good thing I keep back ups of autoexec.bat and command.com. Those JT> are probably the only 2 back ups I have, but I do have those :) FWIW, command.com is only ONE of your system files. There are probably two or more that are "invisible" which are just as important. But they're "standard" just like command.com, so you should be able to reproduce them easily. Your config.sys OTOH is probably a GOOD thing to back up, along with your autoexec.bat, since they're "unique" to your machine. Now, it would be off-topic for me to mention that you "should" keep backups of everything (or else keep folks like me rich) so I won't say that. BUT, it's VERY much ON-topic for me to recommend that you make a backup of your key rings, ESPECIALLY your secret key(s) and matching public key(s). A number of people here can attest to that from first-hand experience. Bill Brown -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBL1IpQsgAxnJSExcxAQEEJgP/WNoKVQTryzqZhVLQ3Wff5AlpyQ2r1vtq S0GmaAKwpOBxtxVuAfoHkDVGPGt/GAJrQ3wwmOlZrUUzqmikmTwNFPN94IsL9vOG bFIf4eGjrmXP8l/2YsTfrxnZeYWGW3qf28tmLFzcKXPWM86SZi5i71+B4Wrss4gz VMVMV8MMgxk= =3fBP -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718