[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: IPG message
At 02:58 AM 3/20/96 GMT, ECafe Anonymous Remailer wrote:
>could some kind person that got IPGs' many time pad thing post it
>somewhere so people that never got a copy can see it????????
>
>
>
>thanks.
>
>
>
>
>
>
>
IPG wrote:
Obviously, you meet our requirementsfor the release of the IPG ABC
Encryption algorithms. We need no further information from you. though we
would appreciate your telephone num and snail mail address.
The algorithms detailed below are copyrighted 1995 and 1996 by Internet
Privacy Guaranteed, Seymour, TX. All rights are reserved. You may not
provide them to any other party, or parties, by any means or
any media, without the expressed written permission of Internet Privacy
Guaranteed. What is specially claimed as copyrighted and or patentable are:
1. The use of the word Ultima for the system, because it is
impossible to have a either a more secure system - it is
impossible to break the Ultima system, other equally difficult
to break systems may exist, or may be formulated in the future,
for example a true OTP, and in those cases, they may
"theoretically" be more difficult to break than the IPG Ultima
System, for example a true OTP. However, that would exist only in
theory, because in those eventiualities, none of the
systems would be breakable.
Furthermore as to speed, Ultima, or simple variations, XOR, OR,
or AND, instead of the Add or Subtract, is the fastest possible
algorithm which will produce an unbreakable encryption system,
without having a single OTP byte for each byte of plain text to be
encrypted, as in an OTP. However, with the IPG system, we can
obtain the same speed, or theoretically faster speeds than a pure
OTP, with some very simple parrallelism - and that begs how
you get humoungous OTPs to use, both in terms of generating
them and getting them into a stream to be XORed against the plain
text. That FACT, that the IPG algorithms are the fastest
possible encryption system which will become evident when you
examine the algorithms in detail.
Thus it is impossible to produce a better system, in terms of
either security or speed, thus we call our system Ultima, the
ultimate.
2. The use of the term ABC Encryption algorithm that at once
describes the basics of the system and its simplicity as will
quickly become evident.
3. The use of a hardware generated OTP, which serves as a purely
random seed, for the system to be described.
4. The use of a table of prime numbers, any number of which is greater
than 3, from which random selections are made to be used in the
algorithms to be described. The prime numbers for the system
described have been selected for a specific hardware, namely the
IBM PC clone, market. With other 16 bit, 32 bit, or 64 bit
hardware, other prime numbers could be used to provide immediate
results just as in the system to be described. The use of
larger numbers, the use of larger adders, or logic gating
systems, is self evident in the copyrights/patents.
5. The use of a random 8 bit seed for the dynamic vaiable that links
the sets of equations into one system. This variable, D, for
dynamic is the real key that distinguishes our system from any
other system - excepting hardware implemented systems that use
extremely large numbers, and or possible partitions, that
encompass possible meaningful message lengths. Such systems, are
self evident extensions of the simple IPG system.
6. The use of partitions within one OTP, pure random seed, PRNG stream
- either by using parts of the random seeds, or more
likely by using fixed intervals within the PRNG stream, for
example, arbitrarily say every 100 gigabytes, or 100 terabytes for
that matter. Using this technique, one random seed can be used for
any abritrary period of time, one message, 10 messages, one day, one
week, one year, one century, one millenium or whatever. The use
of multiple Ds, in linear partitions, that is within one otp
every terabyte fior example, is a self evident extension of the
IPG system.
7. The use of a simple serial hardware implementation of the IPG
system is self evident, and produces impressive speeds, mutiple
megabyte per second, dependent of course on hardware speeds.
8. The use of a very simple single level of parallelism in hardware
implementation, where the ABCs are computed in parrallel, and
the D is passed along, is a simple self evident extension
of the system and will allow a throughput of over
100 megabytes per second, on state of the sart hardware.
9. The use of a three dimensional parallel system, where the PRG
stream is chopped up into several partitions, say every terabyte,
and then each module proceeds as in paragraph 8, just above, is a
simple extension of the basic IPG system, a would enable a system
to operate at any conceivable line speed.
10. The changing of the number of equations, modules, prime number
values, length of prime numbers, or length of random sample, probe
values, or the other algorithmic values does not change the basic
algorithm. It is the same algorithm with different values.
With the previously detailed claims relating to the copyrightable and
patentable features of the IPG algorithm system, IPG prersents
the the Ultima Algorithms. - the ABC Encryption system.
Given:
1. A 1792 BIT OTP, RANDOM SEED, generated from a hardware
source.
2. A Table of 319 Prime Numbers in the range of 6,667 to 11,997, out
of the 580+ available, the 384 selected for dynamic variance,
the table is called BPRIMES.
3. A Table of 319 prime numbers in the range of 14,007 to 19,997, out
of the 800+ available, the 384 selected for dynamic variance,
the table is called CPRIMES
The 1792 bits of OTP, Random Seed, are allocated as follows.
1. 512 bits for the 64 probes, for 64 C vales
2. 512 bits for the 64 probes, for 64 B values
3. 512 bits for the 64 starting A values
4. 8 bits for the initial ID value.
Those 1544 bits are the actual random seed used for generating
the PRNG stream, if you insist on calling it that. In addition,
there are 248 bits used as follows.
5. 128 bits for the offset, partition, if applicable into the
PRNG stream. Actually they are used to encrypt the
actual underlying value of the partition, if any - note - in
this case the mode is actually a true OTP, the first time
only ot really does not help to know the offset unless
you know the OTP, Random Seed.
6. 72 bits for uniquely identifying the OTP being used.
7. 48 bits as spares temporarily - can be used as different D
values for partitions. If more As, Bs, Cs, are needed the
random seed, OTP, can be expanded as necessary. Unlike RSA,
there is no practical limit - I am actually sending you 1792
BYTE Random seeds, so that you can test other variations if you
like, or use each of them, there are 32 of them in all, as 8
random seeds for the 1792 bit algorithm.
8 bit random starting A values are sufficient because we are
only talking about the effect on the low order 8 bits in our PRNG
stream. We actually AND these values with the constant 13,568
to give us a start that will intially have a dynamic effect
on the A, B, and C values, that is the smallest possible
B+13568, exceeds that largest possible C value.
This selection process of course makes the A, B and C values
random, 8 bits, as well as the initial ID value - the random range of
each set is 2 to 32 but as you will see they are interlimked
with the Dynamic variable, D.
The procedure is as follows:
1. Using the 64 bytes for B selection, we select 64 Bs,
B1,..,B64, as follows.
B1=BPRIMES(SB1) WHERE SB1 is the first byte of the Random Number
Seed, thus B1 is one of the BPRIMES, BPRIMES(0),..BPRIMES(255)
then
BPRIMES(SB1)=BPRIMES(256)
then
B2=BPRIMES(SB2) AS BEFORE EXCEPT Byte 2 of the OTP, Random Seed,
is used.
then
BRPIMES(SB2)=BPRIMES(257)
and so forth through 64
Thus you have 64 constants, B1,..,B64, each of which is an unique
prime number. This of course, is the same as a lottery selection,
except there is no denominator and the section pool does not
shrink. Thus you have 1 in 2 to the 512 possibilities of a
repeat, or guessing the selections.
2. The same procedure is used for selecting 64 C values, C1 through
C64.
3. The 64 starting A byte values, from the random seed, are
ANDed to 13,568 to give the 64 starting A values, random, at least 8
bit random.
4. 8 Bits are used for the starting D value
Thus the B and Cs are constants - the As and D changes
Then quite simply, you have 64 equation sets as follows.
A1=(A1+B1) MOD C1 (Move, Add, Compare, Conditional Subtract)
D=(D+A1) AND 255 (Really just use DL in assembly language)
+
A2=(A2+B2) MOD C2
D=(D+A2) AND 255
..............
+
A63=(A63+B63) MOD C63
D=(D+A63) AND 255
+
A64=(A64+B64) MOD C64
D=(D+A64) AND 255
the XOR operation against the plain text may vary. In our case, we
accumulate a pair of DLs in CX, and then XOR it against a wor, two
bytes of plain text. Thus we have one XOR for each set of two
equations above, 32 XORs for the 64 equations. We string A1 type
8 sets of those 64 equations together, essentially duplicates of each
other except for the XOR operation, which are constants, as opposed to
indexed variables. Thus we do a disk sector at a time, with only the
A values and D being variables. With double buffering, you can see
that it cooks, to say the very least.
Obviously by definition, there can be no repeat before the product of
the C values, that is (C1*C2*C3,..,*C63*C64), and that does not take
into account the starting A values and the starting D value. The
average C value is slightly over 14 bits. Accordingly, no repeat
is possible before 2 to the 864th power,minimum, or 2 to the
896th power average, 10 to the 267th power minimum, which will handle
anything that can possibly occur, ever, ever, ever. If every atom in
the universe was a Googol of Cray T3E's and they had been computing
since the big bang, the possibilities they would have tried so far
would be less than 1 part in 1 Googol. And that does not take into
account the other 2 to the 1543+ possibilities.
There is absolutely no way to prove that any message of any possible
length is or is not possible, without trying all of the 1 to the
470th power possibilities, which of course is impossible. As John
von Neumann once said to Dr. Bloome (Dottie), in my presence - it
in a similar but totally unrelated case, it is not enough to say
that it some theoretical message may not be theoretically possible, you
must prove that at least one specific message is not possible. Of
course, like JvN's case, that is not possible in the case of the IPG
system.
Continuing along that line, we in recognize that because we are
working with a 1544 bit key, over 2 to 1543, but someewhat less than 2
to the 1544, that we only have approximately 10 to the 478th
possibilities, that is 2 to the 1543+. Thus with a 125,000 byte message,
we do not have 2 to 1,000,000th possible keys, but only 2 to the 1544
possible PRNG streams. Having said that, and fully recognizing that as
incontrovertible, we invite you to test a long PRNG generated stream
by the method, using a truly random seed of 1544 bits. You will
find over both short and long sample sizes that the "effect" is
indistinguishable from an OTP of the same length.
To facilitate this, we are including herewith:
I combined all these files listed below under BSD UNIX with the zip
program so you shouldn't have any problems extracting them. If you do,
please get back in touch with us and we can re-send the file under a
different format, PKZIP.
Note: The zipped files are considerably larger than the original
because they are random unzippable data files.
I promise you that with these, you can write the program to generate
the PRNG streams in somewhat less than two hours. I am referring to the
64 sets of the equations set out above:
This approach will also demonstrate how incredibly fast the system is
and also how incredibly secure it is.
Therefore, please find attached in the zipped file BINARY.ZIP
consisting of:
1. BPRIMES.DAT - 384 prime numbers used for randomly selecting the
B1,..,B64 values in what we are now calling the 1792 bit system - I
am including 384 instead of 319 in case you want to try variations..
2. CPRIMES.DAT - 384 prime numbers used for randomly selecting the
C1,..,C64 values in the 1792 bit system - again 384 in case yopu
want to try variations.
3. 32 - 1792 BYTE Hardware generated OTPs, specifically
OTP.001,..,OTP.032. - any of these may be used in the 1792 BIT
system, or the 5600 BIT system, or the 12288 BIT system. Further,
any of the 32, can be used for other possible system
configurations. The L1792 BYTE OTPs, can also be broken down
into 8 - 1792 BIT OTPs.
With these variables, you will not have any problem doing any
kind of test that you may desire.
As a prelude, consider, if you will, the 1st 64 bytes of the PRNG stream.
1. Byte 1
D is random
A1=(A1+B1) MOD C1: is where A1 is random, 8 bit, and B1 and C1 are
randomly selected from a table of primes and become a
constant for that OTP, random seed. THE resultant A1 is some
indeterminate number between 0 and C1-1. A1 MOD 256 is
therefore likewise some random number between 0 and 255.
There are 16,677,216 possible variations, and only 1 is the
actual.
ID=(ID+A1) AND 255. ID is random and A1 is pseudo random with
16,677,216 possible variations.
Accordingly: by definition the new TD is random.
Now therefore: if D was used for only this equation, there
would only be 2 to the 32nd possible, 8 ID - 8 A1 - 8 B1
& 8 C1 possible variations and what you would have would
be a system partioned into 64 didfferent subsystems. However,
that is obviously not the case, D is passed from one
equation set to the next, so there is no repeat possible until at
the very least ID short of the entire C1*C2,..*C63*C64 cycles.
2. Byte 2, The process is the same and the resultant ID is
random.
The process is the same for all the other 62 bytes.
Accordingly, how is it possible to determine the first 512 bits of the
PRNG stream? That is 10 to the 158th power possibilities. Obviously
they cannot all be tried - and any of the possible 2 to the 512th
power of underlying clear text is possible.
As stated, the reultant system is absolutely unbreakable - no ifs,
no ands, no buts, no maybes, no anything. Also, as you can clearly
demonstrate for yourself, there is no more robust system, with
respect to speed, possible. It is truly Ultima, the ultimate
system, as you will find out for yourself.
Enough, I assume. After you have satisfied yourself that the ABC
Encryption system is absolutely unbreakable and the fastest system
possible. We will proceed to the demonstrate that the Key
distribution is no problem and as stated, we are willing to license
the process as desired by users.
I invite your response,
Thanks so much,
Ralph,
John Pettitt, [email protected]
VP Engineering, CyberSource Corporation, 415 473 3065
"Technology is a way of organizing the universe so that man
doesn't have to experience it." - Max Frisch
PGP Key available at:
http://www-swiss.ai.mit.edu/htbin/pks-extract-key.pl?op=get&search=0xB7AA3705