From: Igor FOULD (igor.fould@anect.com)
Date: Sun Jan 01 2006 - 20:23:00 GMT-3
At any rate, try to take a look at the RFC 1321 that I recommended you a 
day ago .... You should be able to read materials like this if you chase 
  a CCIE certification ... :-)))
IXF
Tim wrote:
> OK, Scott, You're on.  Let me know the next time you're schedule to be in
> NY.
> 
> Regarding the list:  I knew I left out something.  But, thanks to William
> Stallings' book, Cryptography and Network Security Principles and Practices,
> for reminding me about FCS (Frame Check Sequences) which, of course, are not
> to be confused with CRC or Checksums.  
> 
> (Why?  I have not the slightest clue. I suspect they're just different names
> for essentially the same things designed to intimidate the casually curious
> student of networking. Do you agree?)
> 
> BTW, this Stallings book is actually reasonably readable compared to most
> books on Cryptology.
> 
> I'm not sure I have the time or motivation (even if I made the outrageous
> assumption I had sufficient knowledge) to write a truly professional
> document on this so maybe I'll accept the idea of magic for now.  However,
> if Cisco Press asked me....
> 
> OK, it's time to move on and stop blabbering....
> 
> Tim
> 
> -----Original Message-----
> From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
> Scott Morris
> Sent: Sunday, January 01, 2006 3:39 PM
> To: 'Tim'; security@groupstudy.com; ccielab@groupstudy.com
> Subject: RE: Hoping for Hashing Help
> 
> Heheheh...  I still think that "magic" is a perfectly acceptable phrase for
> many people!  Like I've said, I really don't care HOW the engine in my car
> works as long as it actually does!
> 
> 1.  Definitely my fair share   ;)
> 2.  Nope, I'm an entertaining drunk.  But I try not to get too wasted 'cause
> you reach a point where you don't remember the fun you're having!
> 
> I think that list is a good idea, and can certainly help you in your quest
> to understand where all this magic fits in and why things are used!  I say
> go for it, create the paper and I'm sure many people will sing your praises
> for it!  (Or sit back and just say "mmmmmm...  Magic")   ;)
> 
> Scott 
> 
> -----Original Message-----
> From: Tim [mailto:ccie2be@nyc.rr.com] 
> Sent: Sunday, January 01, 2006 12:23 PM
> To: 'Scott Morris'; security@groupstudy.com; ccielab@groupstudy.com
> Subject: RE: Hoping for Hashing Help
> 
> I've heard you say that before - that you can drink a lot.  OK, here are 2
> q's:
> 
> 1)  How much can u really drink?
> 
> 2)  Do you get nasty when you're drunk?
> 
> If you're a good drunk, then I don't care how much you drink.  I say bring
> it on.
> 
> 
> Regarding Hashing:  I was about to mention the idea of combining a shared
> key with the plaintext message to create a message digest that does more
> than just verify the integrity of the original message but then I thought
> lots not clutter too many thoughts in one post.
> 
> But, since you mentioned it, I think a whole lot of people would understand
> all this stuff much better if info like this were just spelled out plainly.
> 
> For example:
> 
> At simplest:
> 
> 1)  parity
> 
> What it does... How it works... Where it's used...
> 
> Pros...   Cons...
> 
> 2)  CRC
> 
> What it does... How it works... Where it's used...
> 
> Pros...   Cons...
> 
> 3) Basic Hash
> 
> What it does... How it works... Where it's used...
> 
> Pros...   Cons...
> 
> Different versions...
> 
> 4)  Hash with Shared secret key (HMAC)
> 
> 
> 5)  Hash with Private Key (Digital Signature)
> 
> 
> I think if it's broken down like this, even (non-Einstein) people like me
> can understand it.
> 
> I also wouldn't mind seeing a clear concise comparison of all these words
> that seem to mean the same thing but don't quite mean the same thing such
> as...
> 
> password
> 
> passphrase
> 
> key
> 
> secret
> 
> one-time pad
> 
> initialization vector
> 
> and others that don't readily come to mind at the moment.  With all these
> terms floating around and sometimes being misused, it's no wonder people
> find this stuff confusing.
> 
> In this case, I don't think "Security by obscurity" really works.  I think
> people just get turned off and decide not to deal with it.  What do you
> think?
> 
> Tim
> 
> -----Original Message-----
> From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
> Scott Morris
> Sent: Sunday, January 01, 2006 11:02 AM
> To: 'Tim'; security@groupstudy.com; ccielab@groupstudy.com
> Subject: RE: Hoping for Hashing Help
> 
> Hehehe...  Be careful there, I can drink a lot!  :)
> 
> It's interesting sometimes!  CRC is a good comparison, and that's a nice way
> to look at it.  You want to make sure that something hasn't been messed with
> whether an error (CRC) or intentional.  So it's more sophisticated that
> people can't hide their tacks very well.  Basic parity or FEC is similar,
> but more designed to allow error correction in small chunks.
> 
> One of the primary differences between MD5/SHA key exchanges and something
> like parity checking or CRC's is that often there is a starting "seed" value
> as part of the algorithm.  This could be your pre-shared key, or your RSA
> key, or whatever you choose to use.  But that all goes to being part of the
> sophistication.  Otherwise, like with a CRC, whatever changes I may make to
> your packets I can regenerate a new CRC to make things look just fine.  So
> we need to add to the sophistication and come up with "more stuff" to add in
> order to make it less likely that anyone can change things around. 
> 
> Cryptology is a very interesting science.  I just don't have the
> inclinication to get my brain too deep into it!  I used to work with a guy
> who could whiteboard out and generate MD5/SHA outputs.  I'm not like that!
> (grin)  
> 
> Scott
> 
> -----Original Message-----
> From: Tim [mailto:ccie2be@nyc.rr.com]
> Sent: Sunday, January 01, 2006 8:32 AM
> To: swm@emanon.com; security@groupstudy.com; ccielab@groupstudy.com
> Subject: RE: Hoping for Hashing Help
> 
> Hey Scott,
> 
> First, let me wish you and your family the best possible 2006 imaginable.
> 
> And, if we do meet up sometime this year, ALL your drinks are on me.  How
> much can you drink?
> 
> Thanks for the reply on Hashing.  I didn't know about that sampling process
> and I still don't know exactly what munging is but I get the idea.
> 
> Surprisingly, this cryptology topic has turned out to be much more
> interesting than I expected.
> 
> What I still don't understand is why none of the people that write about
> this Hashing stuff don't put this topic in context.
> 
> When you think about it, isn't hashing just a more sophisticated form of
> parity checking which itself is a less sophisticated type of CRC (cyclic
> redundancy check)?
> 
> Maybe once I fully understand all this stuff myself, I'll write a pamphlet
> geared to normal people.
> 
> Thanks again, Tim
> 
> -----Original Message-----
> From: Scott Morris [mailto:swm@emanon.com]
> Sent: Saturday, December 31, 2005 8:57 PM
> To: 'Tim'; security@groupstudy.com; ccielab@groupstudy.com
> Subject: RE: Hoping for Hashing Help
> 
> MD5 and SHA both take a sampling of the message in question.  That's why the
> message length doesn't matter much.  Although, since sampling isn't a static
> thing that's why MD5 has been shown to have "collision weakness" where more
> than one input could have the same hash output even though it's not able to
> be reverse engineered.
> 
> MD5 gathers its samples based on 512-bit blocks of data from the input
> message.  The one-pass algorithm that takes those samples basically figures
> out how much data there is in the message and does it's magic from there!
> 
> SHA-1 does a different type of sampling arrangement (different advanced
> math) and comes out with a 160-bit fingerprint.  MD5 is 128-bit fingerprint.
> Both are susceptible to a collision-type attack, but SHA-1 is less affected
> by it (or it's more difficult to do), although SHA-2 has already improved
> upon the strength.
> 
> Simple terms?  Magic.  :)   I'm not sure there's much of an easier way to
> look at it.  You take a chunk of data of variable size, you apply one
> algorithm to pull bits of information out, then you take another algorithm
> to munge that information and come up with a fixed-length output string.
> Any change in the message (since we go down to bit-level) can make a big
> change in the output.
> 
> For some examples, wiki search for MD5 and SHA.  
> 
> It's math way above my brain cell structure, so I just am content to know
> the concept and accept the magic.  :)  I turn the key in my car and the
> engine starts. I don't particularly care why or how, it just does, and I'm
> cool with that! (grin)
> 
> Cheers,
> 
> Scott
> 
> -----Original Message-----
> From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of Tim
> Sent: Saturday, December 31, 2005 3:40 PM
> To: security@groupstudy.com; ccielab@groupstudy.com
> Subject: Hoping for Hashing Help
> 
> Hi guys,
> 
>  
> 
> Happy New Year.
> 
>  
> 
> I hope everybody a year from now can look back upon 2006 and say, "This was
> truly a great year."
> 
>  
> 
> Anyway, I've been trying to figure out something that's been bothering me
> about hashing.  According to lots of sources, a hash function can take as
> input an arbitrarily long message and generate a fixed length output which
> seems to be 128 bits in length for most Hashing algorithms such as SHA-1,
> MD5, etc. commonly used today.
> 
>  
> 
> My question is this:
> 
>  
> 
> Can someone explain in simple terms how that's done without using advanced
> mathematics?
> 
>  
> 
> When you think about it, this is very cool.  No matter what length the
> original message is, the hash is 128 bits.  If the message is 100 bytes, the
> hash is 128 bits.  But, if the message is 1,000,000 bytes, the hash is still
> 128 bits.  How is that possible?  I'm hoping someone can illustrate how
> that's done with a simple example.
> 
>  
> 
> Ok, everyone have a good time this evening.
> 
>  
> 
> TIA, Tim 
> 
> _______________________________________________________________________
> Subscription information may be found at: 
> http://www.groupstudy.com/list/CCIELab.html
> 
> _______________________________________________________________________
> Subscription information may be found at: 
> http://www.groupstudy.com/list/CCIELab.html
This archive was generated by hypermail 2.1.4 : Wed Feb 01 2006 - 07:45:47 GMT-3