💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › SURFPUNK › surf0078.txt captured on 2022-06-12 at 14:29:54.
-=-=-=-=-=-=-
Date: Mon, 12 Apr 93 13:48:49 PDT Reply-To: <surfpunk@osc.versant.com> Return-Path: <cocot@osc.versant.com> Message-ID: <surfpunk-0078@SURFPUNK.Technical.Journal> Mime-Version: 1.0 Content-Type: text/plain From: surfpunk@osc.versant.com (orvat qvfpbeqvnaf jr qbag zvaq) To: surfpunk@osc.versant.com (SURFPUNK Technical Journal) Subject: [surfpunk-0078] DIGEST: cyberpunk, ZUMABOT, NREN, FBI, zero-knowledge # While I got a chuckle out of seeing my subscription # request quoted in the SURFPUNK "FAQ", I still have no # clear notion of what SURFUNK is. After a couple # months being on the list, while I like it, I don't # know what to make of it. # # But, being a discordian, I don't entirely mind. (-: # # -- Nowhere Man <rpowers@Panix.Com> # However, if you want to be relatively more realistic, # try Arachnet, and some of the more innovative places # like Leri, Fnord, Surfpunk, Future-technologies, # Info-futures, Extropians, etc.... # # -- Andy Hawks <ahawks@nyx.cs.du.edu> The above are greps from futureCulture. Here's a grep from this surfpunk. --strick :g/Subject:/# 36 Subject: Re: [surfpunk-0076] TALLY: who are surfpunk? 59 Subject: ZUMABOT strikes back 110 Subject: Plan for 'info-highway' runs into FBI road block 185 Subject: MATH: Zero Knowledge Proofs 373 Subject: Telecomm statement on NREN, etc. 382 Subject: Telecomm statement on NREN, etc. [Hit return to continue] ________________________________________________________________________ ________________________________________________________________________ From: Mike Mitten <gnome@noel.pd.org> Subject: Re: [surfpunk-0076] TALLY: who are surfpunk? To: surfpunk@osc.versant.com Date: Thu, 8 Apr 1993 09:41:50 -0400 (EDT) dionf@ERE.UMontreal.CA (Francois Dion) writes: >Which brings to mind an interview with a guy involved in the Black Label >publicity here (from the firm Cossette i think) and the guy said they wanted >to give the tv adds a "cyberpunk look". We better get used to bad uses of >the term by technologically challenged people... This implies that there is a *good* use of the term cyberpunk. Which there is not, as it describes nothing, and serves only to let people know the extent of the coolness of the person using the word. -Mike Mike Mitten - gnome@pd.org - ...!emory!pd.org!gnome - AMA#675197 - DoD#522 Irony is the spice of life. '90 Bianchi Backstreet '82 Suzuki GS850GL "The revolution will not be televised." ________________________________________________________________________ To: surfpunk@osc.versant.com Subject: ZUMABOT strikes back Date: Mon, 12 Apr 93 0:31:50 BST From: jm@maths.tcd.ie More news on the zuma.uucp flamebots/NLP-frankensteins... -- -><- "I find the law of fives to be more evident every time I look" -><- Justin Mason (Iona Technologies' techie-in-residence and unix caretaker) <jm@maths.tcd.ie> -- generic <jmason@iona.ie> -- MIME-extended phone: +353-1-6790677 fax: +353-1-6798039 In article <1993Apr10.190716.3431@mnemosyne.cs.du.edu> jfurr@nyx.cs.du.edu (Joel Furr) writes: >It's like this. Warren Burstein and I newgrouped alt.fan.serdar-argic to >celebrate the follies of the infamous ZUMABOT. Then the 'bot got all >snotty and: > >1) forwarded all mail from sera@zuma.anatolia.org to warren@nysernet.org >2) newgrouped alt.fan.joel-furr (which doesn't look to have gone very far) >3) tried to rmgroup alt.fan.serdar-argic >4) signed Warren up for about sixty mailing lists >5) sent email to our news admins asking to have our accounts yanked >6) threatened legal action against us >7) went berserk and cancelled every current post it could find authored by > sera@zuma.uucp (our guess is so as to be able to claim that it really > hasn't posted all that many articles) > >But at no point did it newgroup alt.fan.warren.burstein, and Warren's >upset because he got left out. Doesn't that damn 'bot have any sensitivity? I *love* it! Warren and I got into it (actually, *I* did) last Pesach, and I have felt bad about it ever since. So seeing alt.fan.warren.burstein gave me such nachus, that I *had* to add it to my .newsrc! Ya gotta love that zumabot -- hell, zumabot posting to s.c.j. and t.p.m. account for some 50% of what my KILL files junk! But tell me, is warren.burstein anything like howard-stern? Does warren have a "robin"? -- Yonatan B. Horen | Jews who do not base their advocacy of Jewish positions and (408) 736-3923 | interests on Judaism are essentially racists... the only horen@netcom.com | morally defensible grounds for the preservation of Jews as a | separate people rest on their religious identity as Jews. _______________________________________________________________________ Source: Atlanta Journal / Atlanta Constitution, 12apr93, p A11 Subject: Plan for 'info-highway' runs into FBI road block Author: Andrew Glass About-The-Author: Andrew J. Glass is chief of the Cox Newspapers Washington bureau. Washington -- It was the kind of story sure to make big news: Hired Killers with links to Libya down a domestic jet over Chicago with a hand-held rocket launcher. But it didn't happen. The FBI got a timely tip, tapped a phone line and foiled the plot. An FBI memo that now sits on the desk of Attorney General Janet Reno suggests that kind of police work may not be so easy in the new age of all-digital phone networks. All the court orders under the sun won't get you in if the data is encoded and if the FBI lacks the key. The FBI is pushing hard for a new law to alter the design of the next wave of voice and data lines in ways that would make it easier to tap them. Otherwise, the bureau fears, its future wiretaps will yield only the stillness of glass fibers, pulsating at the speed of light. Basically, all we're trying to do is just keep the status quo, says an FBI agent. His agency, he points out, isn't asking for anything more intrusive than it already has. If society wants us to hit organize [sic] crime, thwart terrorists and catch spies, then Congress must act, he argues. But it won't happen soon. And it may never happen. For, on this issue, the G-men face a long list of foes. The list begins with the civil liberties folks. Already, they see, not without some cause, Big Brother keeping score. In such circles, they say, the FBI might just as well call for a ban on gloves. Since gloves don't leave any fingerprints, they make life harder for cops. Nor are the mega-owners of what Time magazine dubs "The Info Highway" all that happy about what the FBI now wants from them. While phone people have long been known for playing ball with the police, in these tough times they think the customer must come first. Money, to be sure, is an issue. But that isn't their main fret with being bound to build hidden "back doors" into their networks. While designed to be opened only by the FBI, one can see how others may also learn to tap dance [truly sic]. People have been making up codes for a very long time. Even now that we are buddy-buddy with the Russians, the secret National Security Agency employs upward of 35,000 code breakers. In the digital world, however, there are only two states of being -- on or off. On paper, they look like an endless chain of near-meaningless strings of zeros and ones. They also hold out the hope (and, for the FBI, the fear) of true privacy. Despite the huge stakes for both sides in this fight, the public debate has been muted. Here and there, a few trade journals review the arguments. Secret (and coded) memos cut an electronic path through the federal maze as sets of officials seek the comments of their peers and of higher-ups. Last year, President Bush backed the FBI view. The agency wrote new entry standards that would let it break into fax machines, cellular phones and private data networks. But Congress balked. The new attorney general has yet to tip her hand. In time, this issue will reach the White House. The current occupant has never seen a technology he didn't like. And President Clinton also has a thing about wanting to please people. However he comes down on this one, he's likely to leave some people mad. ________________________________________________________________________ Date: Wed, 7 Apr 93 21:31:39 -0700 To: Extropians@gnu.ai.mit.edu From: tcmay@netcom.com (Timothy C. May) Subject: MATH: Zero Knowledge Proofs Cc: cypherpunks@toad.com [Since this should also be of interest to the Cypherpunks list, which Ray is/was subscribed to, I am posting this essay to that list.] Ray Cromwell writes: > Could someone explain zero knowledge proofs and give me an example. I >have taken number theory and abstract algebra so feel free to use equations. > >(I know that zero knowledge proofs are a way of certifying something without >revealing the information you are certifying, but I want to know how they >work mathematically) Zero knowledge interactive proof systems ("ZKIPS") are sometimes called "minimum disclosure proofs" (with some subtle differences) and are exciting and mysterious (at first) methods that lie at the heart of modern cryptology. Here's a simple explanation. Too bad we don't have a blackboard! ALICE AND BOB (some people call them Peggy the Prover and Vic the Verifier) Alice wishes to prove to Bob that she knows some item of knowledge without actually giving Bob any of that knowledge. Let us first imagine that Alice claims she knows a "Hamiltonian cycle" on a particular graph. (For a given set of nodes and arcs linking some of those nodes, a Hamiltonian cycle is one which passes through each node once and only once. You might want to draw some graphs on a sheet of paper and try to find a Hamiltonian cycle for the graphs, to get a feel for the problem.) The particular graph may be "registered" somewhere with Alice's claim that she--and only she, for reasons I'll discuss at the end--knows a Hamiltonian cycle for the graph. In a sense, this is her "proof of identity." To make this example concrete, Alice is using this piece of knowledge as her *password* to get into some system. She presents a map of 50 cities and some set of highways interconnecting them and says "I am who I say I am if and only if I know a Hamiltonian cycle for this graph." The conventional (non zero knowledge) way to convey this knowledge is for Alice to simply *show* the Hamiltonian cycle to Bob. This is how passwords are currently handled. Bob, and anybody else who is spying on the exchange, then knows the "secret," which isn't a secret anymore. (Anybody who saw the exchange, including Sysadmin Bob, could then impersonate her.) ENTER ZERO KNOWLEDGE Alice, instead of showing Bob the Hamiltonian cycle, takes the cities and covers them with something, say, coins. (On a computer, this is all done in software, using the cryptographic protocol called "bit commitment.") Alice scrambles the position of the cities (covered by coins) so as not to allow positional cues. (Most of the 50 cities should have about the same number, ideally exactly the same number, of links to other cities, to ensure that some cities are not "marked" by having some unique number of links. A detail.) Needless to say, she scrambles the cities out of sight of Bob, so he can't figure out which cities are which. However, once she's done with the scrambling, she displays the cities in such a way that she can't *later change*..i.e., she "commits" to the values, using well-known cryptographic methods for this. (If this sounds mysterious, read up on it. It's how "mental poker" and other crypto protocols are handled.) Bob sees 50 cities with links to other cities, but he doesn't have any way of knowing which of the covered cities are which. Nor, I should add, are the links labelled in any way--it wouldn't do to have some links permanently labelled "Route 66" or "Highway 101"! She says to Bob: "Pick one choice. Either you can see a Hamiltonian cycle for this set of covered cities and links, or you can see the cities uncovered." In other words, "Alice cuts, Bob chooses." Bob tosses a coin or chooses randomly somehow and says: "Show me the cities." Alice uncovers all the cities and Bob examines the graph. He sees that Akron is indeed connected to Boise, to Chicago, to Denver, not to Erie, and so on. In short, he confirms that Alice has shown him the original graph. No substitution of another graph was made. Bob, who is suspicious that this person is really who she claims to be, says to Alice: "Ok, big deal! So you anticipated I was going to ask you to show me the cities. Anybody could have gotten Alice's publicly registered graph and just shown it to me. You had a 50-50 chance of guessing which choice I'd make." Alice smugly says to him: "Fine, let's do it again." She scrambles the cities (which are covered) and displays the graph to Bob...50 covered cities and various links between them. She tells Bob to choose again. This time Bob says: "Show me the Hamiltonian cycle." Without uncovering the cities (which would give the secret away, of course), Alice connects the cities together in a legal Hamiltonian cycle. Bob says, "OK, so this time you figured I was going to ask you the opposite of what I did last time and you just substituted some other graph that you happened to know the Hamiltonian cycle of. I have no guarantee the graphs are really the same." Alice, who knows this is just the beginning, says: "Let's do the next round." ...and so it goes.... After 30 rounds, Alice has either produced a legal Hamiltonian cycle or a graph that is the same as (isomorphic to...same cities linked to same other cities) the registered graph in each and every one of the rounds. There are two possibilities: 1. She's an imposter and has guessed correctly *each time* which choice Bob will make, thus allowing her to substitute either another graph altogether (for when Bob wants to see the Hamiltonian cycle) or just the original graph (for when Bob asks to see the cities uncovered to confirm it's the real graph). Remember, if Alice guesses wrong even once, she's caught red-handed. 2. She really is who she claims to be and she really does know a Hamiltonian cycle of the specified graph. The odds of #1 being true drop rapidly as the number of rounds are increased, and after 30 rounds, are only 1 in 2^30, or 1 in a billion. Bob choose to believe that Alice knows the solution. Alice has conveyed to Bob proof that she is in possession of some knowledge without actually revealing any knowledge at all! The proof is "probabilistic." This is the essence of a zero knowledge proof. There's more to it than just this example, of course, but this is the basic idea. SOME DETAILS 1. Could someone else discover the Hamiltonian cycle of Alice's graph? Exhaustive search is the only way to guarantee a solution will be found--the Hamiltonian cycle problem is a famous "NP-complete" combinatorial problem. This is intractable for reasonable numbers of nodes. 50 nodes is intractable. 2. If finding a Hamiltonian cycle is intractable, how the hell did Alice ever find one? She didn't *have* to find one! She started with 50 cities, quickly connected them so that the path went through each city only once and then wrote this path down as her "secret" solution. Then she went back and added the other randomly chosen interconnects to make the complete graph. For this graph, she obviously knows a Hamiltonian cycle, *by construction*. 3. Can Bob reconstruct what the Hamilonian cycle must be by asking for enough rounds to be done? Not generally. Read the papers for details on this, which gets deeply into under what circumstance partial knowledge of the solution gives away the complete solution. 4. Are there other problems that can be used in this same way? Yes, there are many forms. I find the Hamiltonian cycle explanation quite easy to explain to people. (Though usually I can draw pictures, which helps a lot.) 5. How general is the "zero knowledge interactive proof" approach? Anything provable in formal logic is provable in zero knowledge, saith the mathematicians and crypto gurus. Check out the various "Crypto Conference" Proceedings. Hope this helps. -Tim May -- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay@netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: MailSafe and PGP available. _______________________________________________________________________ To: surfpunk@osc.versant.com From: "Gregory L. Searle" <GSEARLE@ccs.uoguelph.ca> Date: 9 Apr 93 01:28:13 EDT Subject: Telecomm statement on NREN, etc. Reply-To: GSEARLE@ccs.uoguelph.ca Here it comes, Third-Hand. More info on NSFNET and NREN. ------- Forwarded Message Follows ------- Date: Fri, 26 Mar 1993 18:01:20 EST From: Jim Conklin <CONKLIN@BITNIC.BITNET> Subject: Telecomm statement on NREN, etc. To: Multiple recipients of list BITNEWS <BITNEWS@UGA.BITNET> This may be of general interest to those of you wondering what's coming (and why) with the NSFNET and NREN. / Jim ----------------------------Original message---------------------------- Finally a clear statement of what they want and why the NSF is planning changes to the backbone funding and usage. For Release: March 23, 1993 LEADING TELCO CEOs JOINTLY SUPPORT CLINTON-GORE TECHNOLOGY INITIATIVE The Chief Executive Officers of the nation's leading local and long-distance telecommunications companies today announced that they have signed a landmark public policy position statement (attached) -- signaling strong industry-wide support for the communications technology initiatives envisioned by the Clinton- Gore Administration. The statement was signed by the CEOs of Ameritech, AT&T, Bell Atlantic, Bellcore, BellSouth, Cincinnati Bell, Inc., GTE, MCI, NYNEX, Pacific Telesis, Southern New England Telephone Company, Southwestern Bell Corp., Sprint, U S WEST. The policy statement provides a set of principles consistent with the Administration's initiative, "Technology for America's Economic Growth, A New Direction to Build Economic Strength," and articulates the roles government and industry should play. The CEOs suggest the Administration and Congress adopt these principles as a framework for cooperation among federal, state and local governments, key users communities -- such as schools, libraries and health care providers -- and the private sector (including telecommunications, computer, information, and related industries.) In addition, the set of principles recommends that government support research on applications and services that benefit schools, health care, and industries crucial for U.S. competitiveness, as well as research that will make it easier for people to connect to, and use, information networks. Benefits to come from following these principles would include: