Let’s Encrypt Root CA Expiration
https://community.letsencrypt.org/t/production-chain-changes/150739
Rich Pieri via lists.blu.org Fri, Oct 1, 9:34 PM
to discuss
Some CA bundles like the one distributed with Sylpheed for Windows
contains several expired CA certs including the now expired
DST Root CA X3 certificate.
This can cause problems with Let's Encrypt certificates
even though the bundle has the ISRG Root X1 CA cert.
ROT8000 is the Unicode equivalent of ROT13. What’s clever about it is that normal English looks like Chinese, and not like ciphertext (to a typical Westerner, that is).
not as easy to do in shell or Perl/Python as Rot13 !!
Sebastian Schinzel @seecurity
“Why BSI can’t encrypt”.
The German Ministry of Information Security (BSI) just leaked one of its PGP private keys. The receiver initially asked for the public key and got the private key as an email attachment.
Don’t treat this as a failure of BSI people. They are good people. It’s more like “PGP is so shitty that even the BSI screws it up badly”.
c/o
Stephan Neuhaus @stephanneuhaus1
Nov
16, 2021
Cryptography is a machine for turning any problem into a key management problem.
deleted
so anonymous
PGP is a program which turns cryptography into an arsenal full of foot-guns
Quantum Superposition when used for computing.
Yes !
Quantum Cryptanalysis
Classical “Forward Secrecy” - old messages not broken by later loss of host key
Generalized: old saved messages not broken by breakthroughs either.
Realistic threat?
The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks. – NIST
National Institute of Standards & Technology started a multi-round competition, similar to with AES and SHA3 competitions
† and weeks later into Round 4, SIKE
was broken. Badly.
1 core-hour.
Well, that was
^
further research^
.
The plan is to roll out these new PQC ciphers as additional cipher options in TLS. Soon?
FIPS Allowed
.FIPS Approved
.No. It’s happened.
Bletchley Park Podcast E131: It Happened Here: Secrets of the Supermarina 3 (91 min)
November 2021
Many visitors to Bletchley Park are familiar with the story of breaking Enigma and reading German and even Japanese codes. But equally important work was done on Italian ciphers.
Not only were the Code-breakers able to read Italian naval messages, before and during the war, but this information was used to decisive effect in the Battle for North Africa, and the ultimate defeat of Italy in 1943. In this It Happened Here episode, Bletchley Park’s Research Historian Dr David Kenyon reveals the secrets of one of Bletchley Park’s lesser-known decryption successes.
As always, grateful thanks go to Dr Ben Thompson for voicing our archival documents.
Featuring the following contributors from our Oral History Archive:
Mavis Batey
Rozanne Colchester
PER
K
or
PER
K
SUPERMARIN
K
`
Another Bill Tutte, Tommie Flowers & Dollis-Hill Gang at P.O.R.S. legend that is not yet fully understood!
Bill Tutte of BP and the Dorris-Hill Gang for the win, before their latterly-famous “Heath Robinson” and “COLOSSUS” attack on Lorenz.
Tommie Flowers & Sidney Broadhurst of the Post Office Research Station, London (aka Dollis-Hill) were better known in the public for their post-war work on ERNIE1, the Post Office’s Premium Bond Lottery randomizer; and in the UNCLASS Electronics world (IEEE, ITU, etc) for the electronic telephone exchange, 3 years before Bell’s comparable 1ESS was installed in NJ.
(scroll)
NIGHTINGALE codename for a machine
“It is mostly unknown how it functioned.”
“An operator remembered it was like playing a church organ.” (implies both a keyboard and a bank of toggle switches?)
(BP say they may have a photo unlabeled, that has repetition of 6 units, which would be one per rotor, so plausible!)
NIGHTINGALE was the ^
analog^
or emulator
for Hagelin (later CryptoAG) C38/C38m/M109/CSP 1500/AM-1.
NIGHTINGALE was built with telecoms Stepper Relays aka Uniselectors, Stepper switches, Steppers.
Steppers could be used as inside-out rotors, when rotors were used as ROMs.
Uniselector Stepper Switches / Stepper Relays were ubiquitous in pre-electronic electro-mechanical automated telephone exchanges (1927 how-to silent movie)
YouTube of this presentation will be linked here
Prior talks in this series - most talks have slides &/or YouTube attached, sometimes extras. Alas the YouTube audio pre-pandemic wasn’t great, BLU needs a donation of a wireless clip-on mike if we ever return to Hybrid/In-Person meetings. Or we all need to wear a wired or BT headset while presenting in person? if i can get a stealth stage headset that would be better visuals!
News and Focus sections have embedded links.
Good security news streams are https://www.schneier.com/crypto-gram/ and https://isc.sans.edu/, the latter being less cryptologic focus.
History section general references
Bletchley Park Podcast E131: It Happened Here: Secrets of the Supermarina11 (91 min)
Books
Websites
Declassified TICOM reports
See our prior discussions of GEE, VENONA for breaks of One Time Pad↩︎
DSA-1571-1 openssl
predictable random
number generator (CVE-2008-0166)
(Schneier)↩︎
Supermarina = Navy HQ;
^
Super^
as in Superior, Above, Supervisory
over the Navy.↩︎
Not actually Caesar; Self-reciprocal Beaufort, C=K-P & P=K-C, reversed standard alphabet↩︎
Regia Marina Italiana 1940-1943 Naval situation and impact.↩︎
More information on Indicators as used by Allies and Italian Navy: Hagelin serie C: Indicators ( these m209 pages cover all C-38 users and variants including M209 and C38m, looking at national Indicator Systems, including C38m Supermarina. )↩︎
See our prior discussion of CryptoAG RUBICON/MINERVA in 2020 (and minor mention 2021)↩︎
Bauer, op.cit., p.191-192↩︎
TICOM (Target Intelligence Committee) was like PAPERCLIP (collecting science/weapons papers and scientists) but for Intelligence/crypto/maths. (wikipedia, declass archive, archived I-45 inter alia)↩︎
See above footnote on SuperMarina.↩︎