Re: Peer review
Or you could go down the publication / review of your cipher, via https://iacr.org/
But if you are in Australia, you still need DEC / ASD assessment / approval.
39 publicly visible posts • joined 5 Sep 2017
Send me an invite on LinkedIn so we can chat.
If your within the Australian Boarders, you need Defence Export Control & Australian Signals Directorate assessment / permit approval.
--
Mark A. Lane
Founder, Cryptologist, Software / UNIX Engineer @ FooCrypt, A Tale of Cynical Cyclical Encryption
Australia's only, Quantum+ Proof / Secure Cryptography and Steganography Software Solution
( Which also has obtained 3 legal Defence Export Control assessments / permits by the Australian Department of Defence, Defence Export Controls & Australian Signals Directorate )
Meanwhile in the USA....I would like to sell them a government load of FooCrypt, to satisfy their 6 months deadline ;)
https://www.linkedin.com/pulse/what-quantum-mitigation-mark-a-lane
United States: The White House: Executive Order on Improving the Nation’s Cybersecurity
https://lnkd.in/e_bnsQH published yesterday May 12, 2021
This is a large document (8,000 words) and I note that the word "Encryption" appears 7 times, in §3(d) and §4(e) and §8(b), quoting portions of each below.
§3(d)
Within 180 days of the date of this order, agencies shall adopt multi-factor authentication and encryption for data at rest and in transit, to the maximum extent consistent with Federal records laws and other applicable laws.
§4(e)
Within 90 days of publication of the preliminary guidelines pursuant to subsection (c) of this section, the Secretary of Commerce acting through the Director of NIST, in consultation with the heads of such agencies as the Director of NIST deems appropriate, shall issue guidance identifying practices that enhance the security of the software supply chain.
§8(b)
Logs shall be protected by cryptographic methods to ensure integrity once collected and periodically verified against the hashes throughout their retention.
The world is already behind the 8 ball with Post-Quantum-Cryptography sneaking up on us all, and Australia is last in the queue due to the current government policies on encryption based technologies.
The European Union Agency For CyberSecurity has recently released a study 'Post-Quantum Cryptography: Current state and quantum mitigation' [ https://www.enisa.europa.eu... ] which states under 'Quantum Mitigation' :
"If you encrypt data that needs to be kept confidential for more than 10 years and an attacker could gain access to the ciphertext you need to take action now to protect your data. Otherwise, security will be compromised as soon as the attacker also gets access to a large quantum computer. "
And also mentions that the 5 most likely Quantum Algorithms are around 2 -3 years off being finalised as a final NIST recommended cipher to tackle Quantum+ Proofing via single algorithm ( Cipher ).
Given that according to The ENISA if an adversary collects your encrypted data today, they will be able to notationally decrypt it at around 10 years from now, but in reality it would be within the 5 - 10 years time frame, surely the Australian Government should be assisting the Australian Public / Private sectors and protecting Government Data, by highlighting the serious problems around stolen data and trying to assist the Australian Public / Private sectors with a proven 'Quantum Mitigation' solution, rather than continually running scare campaigns and hammering the Cryptography and Steganography Sectors in Australia, by associating their solutions as just a tool that is used by non law abiding citizens / entities.
--
Mark A. Lane
Founder, Cryptologist, Software / UNIX Engineer @ FooCrypt, A Tale of Cynical Cyclical Encryption
Australia's only, Quantum+ Proof / Secure Cryptography and Steganography Software Solution
( which also has obtained 3 legal Defence Export Control assessments / permits by the Australian Department of Defence, Defence Export Controls & Australian Signals Directorate )
FooCryptMsg_1_157_U2FsdGVkX1+36rzplewIdLHPPmIbdq6xT8COe71BS8HTHI940T895ATLPsgHcGBJ
FooCryptMsg_2_157_0ViJoM3YkcsplR2ON1BziyjjhJHlcnpX3zdWSgrYGp4R9KJ4Yk2ngH0h1hsxEcRu
<-- cut due to character limit --->
FooCryptMsg_153_157_sDUpsz5hVdzkGXql1iEE2YiLj1oHGS8o5ACqVjzpGvrdaUTg1KpxAxY/V35rFdax
FooCryptMsg_154_157_QwykDhJj51qrM1vzDtStTXjNV4j7nUMpm9izqGCiflTtng1lD/X6z73vH3WZz8Fd
FooCryptMsg_155_157_TP/hzLKZQp7KhAVla/pQisFEI6CZt+lj3feQlRL9vzDIMcIZ3WNiuEdMH9D+KYDT
FooCryptMsg_156_157_5uIn5gwMtCh0Hcf9fx3//g==
FooCryptMsg_157_157_1691C6A45A05C402B81BFC1844E39E08DE3B313D838D181BA94BC6F1F18CFCE9
anyone found with items that can be used to separate H2O into separate atoms
@ https://en.wikipedia.org/wiki/Water
"Water is a transparent, tasteless, odorless, and nearly colorless chemical substance, which is the main constituent of Earth's streams, lakes, and oceans, and the fluids of most living organisms. It is vital for all known forms of life, even though it provides no calories or organic nutrients. Its chemical formula is H2O, meaning that each of its molecules contains one oxygen and two hydrogen atoms connected by covalent bonds. Water is the name of the liquid state of H2O at standard ambient temperature and pressure. It forms precipitation in the form of rain and aerosols in the form of fog. Clouds are formed from suspended droplets of water and ice, its solid state. When finely divided, crystalline ice may precipitate in the form of snow. The gaseous state of water is steam or water vapor. Water moves continually through the water cycle of evaporation, transpiration (evapotranspiration), condensation, precipitation, and runoff, usually reaching the sea. "
Hydrogen and Oxygen atoms, extracted via your common kitchen kettle, can be collected, stored and utilized as combustion sources in any explosive device...just add the spark from the brains of the combined LNP government combined intelligence to ignite it !!!
https://www.instructables.com/id/Separate-Hydrogen-and-Oxygen-from-Water-Through-El/
If they get asked to assist or ordered to put in a back door, its up to their corporate ethics. Either they comply or fight it.
As a user, the only thing you can do to mitigate an issue, is freeze your development environment, or move it onto some virtualization infrastructure that is protected.
FooCrypt has several distribution models, one being an ISO, which is impossible to backdoor..!
The common flaws in ALL encryption technologies to date are :
1. Typing on a KeyBoard to enter the password
2. Clicking on the Mouse / Pointer device that controls the location of the cursor
3. Some person or device looking / recording your screen as you type the password
4. The human developing a password that is easily guess, or can be brute forced due to its length
5. Sharing the password with a third party to decrypt the data
6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself
7. The Right Wing Policies of the Liberal Party of Australia, being forced into law so they can all make it to the xmas party…!
FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the above ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.
If you haven't heard, VicPol were one of the agencies who pushed hard for the encryption bill to be passed. Am sure the Australian citizens residing or travelling to Victoria, are going to 'TRUST' their ethics and not abuse the new powers ! <- NOT
https://www.abc.net.au/news/2018-12-06/graham-ashton-on-lawyer-x-informer-3838/10588236
I found it easier to provide a quote from one of Rodney Rude's live performances in my first submission to the PJCIS. https://pjcis.foocrypt.net/ but unfortunately, they decided only to accept it as correspondence, and not publish it.
Just re arrange the first three characters of the 9425 in my message above..;)
Im looking at immigration opportunities to bypass what has been an on going 5 year struggle against the Liberal Parties stance on encryption. If you know any, message me via www.foocrypt.net.
I was nuked 2.7 years ago, the Australian Signals Directorate placed a caveat in my Defence Export Controls permit, wanting to know if my software or variations are used in Weapon of Mass Destruction programs.
Be Protected, Get ….…..
The FooKey METHOD :
http://foocrypt.net/the-fookey-method
The common flaws in ALL encryption technologies to date are :
1. Typing on a KeyBoard to enter the password
2. Clicking on the Mouse / Pointer device that controls the location of the cursor
3. Some person or device looking / recording your screen as you type the password
4. The human developing a password that is easily guess, or can be brute forced due to its length
5. Sharing the password with a third party to decrypt the data
6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself
7. The Right Wing Policies of the Liberal Party of Australia, being forced into law
FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.
You know they wont look unless they match a string that proves the text is encrypted in some way...;)
Salted__<8a>ÜRb^AU©<94>PÅÇ^K)¬º<83>6f^BûÁ;Ê}§<93>z´^HùPq&8l_È<87>²^OG~Þ[<8a>å<8d>ã²X^@U<82><9d>^_
....
<83><86>X^LÙÏØÀä^N4^D£ÙC<8a>^V( 7óÓ<8f>¸78*½ønô^\ÂmÍó5<87>S<9c>C°Ùo¾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 government sets the sitting days for both houses of parliament. There was no reason what so ever to explain why the government could not have extended the parliament sitting hours yesterday, or added more days this year to resolve all the flaws in the legislation instead of packing their bags and going home, forcing Labour ( who does not have the insights into the actual intelligence reports on the xmas terrorist attacks mentioned by ASIO ) to pass the legislation.
The 3 billion dollar Encryption export sector has just gone to ZERO....!
If you know of immigration opportunities for encryption software companies, let me know.
FooCrypt, prides itself on providing a solution that "takes away the ‘BAD GUYS’", including crappy legislation that destroys human rights and civil liberties. Oz Government included.
In conjunction with FooCrypt’s Parliamentary Joint Committee on Intelligence and Security, Case Study [ 897316929176464ebc9ad085f31e7284 ] submission on the Telecommunication and Other Legislation Amendment (Assistance and Access) Bill 2018 [ https://pjcis.foocrypt.net ]
FooCrypt,0.0.1,Core has been released with a Demonstration Expiration date of 20190131235959, to enable all encryption users to download / try / buy before the impending legislative changes are brought into effect.
https://store.foocrypt.net/product-category/cryptology/897316929176464ebc9ad085f31e7284
Be Protected, Get ….…..
@amanfromMars 1
Data61 is listed in the credits on the paper.
Data61 is in partnership with the Department of Defence Science and Technology. ( Australian Signals Directorate, et al are all in that mix ).
Perhaps we should thank them for releasing it last Friday, rather than having it sucked up by AssAccess...!
Its been a long day watching the children in parliament and I haven't read the paper in question, but
'The boffins tested OpenSSL, Amazon s2n, MbedTLS, Apple CoreTLS, Mozilla NSS, WolfSSL, GnuTLS, BearSSL and BoringSSL. And they were able to downgrade all except for the last two, BearSSL and BoringSSL.'
From a web server / app api / portal etc perspective, refusing to downgrade would protect the end user trying to connect.
https://cipherli.st
Apache2 example :
SSLCipherSuite EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH
SSLProtocol All -SSLv2 -SSLv3 -TLSv1 -TLSv1.1
SSLHonorCipherOrder On
Should throw an error to the end user's browser / app / etc and mitigate any leakage.
Six months ago, I put forward a submission to Dr Vivian Thom ( Former Inspector General of Intelligence ) regarding the DSGL fit for purpose review. As part of that response, several case studies were provided, including some on the ASD AISE(F|P) process highlighting deficiencies and confusion in what ASD where communicating to software developers who work in the encryption space. [ http://www.defence.gov.au/publications/reviews/tradecontrols/Docs/Mark_Lane.pdf ]
In the 6 months following to date, the Australian Cyber Security Centre has taken over the roles regarding the AISE(F|P) and has been since its launch proving the information via its website ( www.acsc.gov.au )
<——>
https://www.acsc.gov.au/infosec/aisep/evaluation.htm
contact.htm goes to a 404 error page.
‘If you would like further clarification or guidance, please (a href="../../contact.htm">contact ASD(/a). ASD will assist recommending government agencies who need clarification on how to answer the questions. ASD will also assist product developers in understanding the evaluation process and requirements.’(sic)
(=< & )=>
<——>
Apart from the humour aspects of the ACSC committing a denial of service attack against Australian Government Departments and Australian based encryption software developers who seek to secure Australian Government departments by providing greater encryption methods via the AESI(F|P) process ( definitely sponsored by the liberal party ),
What User Acceptance Testing, ongoing website validation testing does the ACSC actually do to verify its own websites without the need of users having to log a cyber security incident against the ACSC ????
Australian Government continues its 5 month long campaign to piss off encryption developers by sending enquires to a 404 error page.
‘If you would like further clarification or guidance, please ( a href="../../contact.htm")contact ASD(/a). ASD will assist recommending government agencies who need clarification on how to answer the questions. ASD will also assist product developers in understanding the evaluation process and requirements.’(sic)
(=< & )=>
Feel free to log a cyber incident regarding the ASD website being hacked by subversive liberal party members trying to influence encryption policies by denying access to government resources.
https://www.acsc.gov.au/infosec/aisep/evaluation.htm
There banning and burning books for Xmas... https://pjcis.foocrypt.net/ Feel free to add an addendum.
The motives and justifications behind AssAccess are over stated, and politicised for all the wrong reasons.
There are plenty of end point tools available to capture key strokes on any point to point encryption method, along with several Man In The Middle attacks which can be used to circumvent the point to point tunnel.
Implementing an 'Insecurity by Design' policy will kill the local IT industry and expose Government, Business and Public to zero days leaked from the so called AssAccess assistance requests.
The FooKey METHOD :
http://foocrypt.net/the-fookey-method
The common flaws in ALL encryption technologies to date are :
1. Typing on a KeyBoard to enter the password
2. Clicking on the Mouse / Pointer device that controls the location of the cursor
3. Some person or device looking / recording your screen as you type the password
4. The human developing a password that is easily guess, or can be brute forced due to its length
5. Sharing the password with a third party to decrypt the data
6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself
In conjunction with FooCrypt’s Parliamentary Joint Committee on Intelligence and Security, Case Study [ 897316929176464ebc9ad085f31e7284 ] submission on the Telecommunication and Other Legislation Amendment (Assistance and Access) Bill 2018 [ https://pjcis.foocrypt.net ]
FooCrypt,0.0.1,Core has been released with a Demonstration Expiration date of 20190131235959, to enable all encryption users to download / try / buy before the impending legislative changes are brought into effect.
https://store.foocrypt.net/product-category/cryptology/897316929176464ebc9ad085f31e7284
Be Protected, Get ….…..
The FooKey METHOD :
http://foocrypt.net/the-fookey-method
The common flaws in ALL encryption technologies to date are :
1. Typing on a KeyBoard to enter the password
2. Clicking on the Mouse / Pointer device that controls the location of the cursor
3. Some person or device looking / recording your screen as you type the password
4. The human developing a password that is easily guess, or can be brute forced due to its length
5. Sharing the password with a third party to decrypt the data
6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself
FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.
In conjunction with FooCrypt’s Parliamentary Joint Committee on Intelligence and Security, Case Study [ 897316929176464ebc9ad085f31e7284 ] submission on the Telecommunication and Other Legislation Amendment (Assistance and Access) Bill 2018 [ https://pjcis.foocrypt.net ]
FooCrypt,0.0.1,Core has been released with a Demonstration Expiration date of 20190131235959, to enable all encryption users to download / try / buy before the impending legislative changes are brought into effect.
https://store.foocrypt.net/product-category/cryptology/897316929176464ebc9ad085f31e7284
Be Protected, Get ….…..
The FooKey METHOD :
http://foocrypt.net/the-fookey-method
The common flaws in ALL encryption technologies to date are :
1. Typing on a KeyBoard to enter the password
2. Clicking on the Mouse / Pointer device that controls the location of the cursor
3. Some person or device looking / recording your screen as you type the password
4. The human developing a password that is easily guess, or can be brute forced due to its length
5. Sharing the password with a third party to decrypt the data
6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself
FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.
I actually pounded 'End Game' [ C.I.A. Financed & staffed by ex N.S.A. head / other defence personal ] for their interference in my software this year via my submission report for the D.T.C.A. [ headed by the former Inspector General Of Intelligence ] review after it took them over 6 weeks to 'white list' it.
http://www.defence.gov.au/publications/reviews/tradecontrols/Docs/Mark_Lane.pdf
CSIRO in partnership with NASA are currently seeking via seek a Computer Systems Administrator with experience in Sun, and scripting in TCL/TK, which is the majority of the code base for 'FooCrypt,0.0.1,Core', so I applied, and am currently seeking a response to my query :
'On my reading of the Position Description, there appears to be no reference to security clearance requirements, can you clarify if a security clearance is required and whom conducts the security clearance.
I'm assuming the position requirements is not in any way in correlation with the recent comments by the head of the F.B.I. in requirements for encryption back doors.'(sic)
CSIRO in partnership with NASA are currently seeking via seek a Computer Systems Administrator with experience in Sun, and scripting in TCL/TK, which is the majority of the code base for 'FooCrypt,0.0.1,Core', so I applied, and am currently seeking a response to my query :
'On my reading of the Position Description, there appears to be no reference to security clearance requirements, can you clarify if a security clearance is required and whom conducts the security clearance.
I'm assuming the position requirements is not in any way in correlation with the recent comments by the head of the F.B.I. in requirements for encryption back doors.'(sic)
'The company also sells servers based on Sparc. There's a chance those might also shift to ARM, said Jim McGregor, principal analyst at Tirias Research. Fujitsu already makes ARM-based microcontrollers and networking chips.'
F.U.D. and stock market conjecture by a non associated research analyst turned into a comment by the author of the 'STORY' from 2016.
There is no factual evidence that it was nothing more than tin foil hat conjecture 2 years on since the story was written.
https://blog.global.fujitsu.com/promising-future-sparc-solaris/
Meanwhile, openSSL is apparently immune to the side channel attack as disclosed in the article, IBM's customised encryption algorithms are in doubt.
Am pretty sure it does have an ecosystem, I used solaris for over 30 years, and its still being actively developed with a roadmap, future, etc....
I take it your an IBM guy who scoffed at Sun in the sale hoping to slice it up and take it out of the market back in 2010 ?
https://www.top500.org/lists/2018/06/
https://www.top500.org/news/chinas-next-supercomputer-may-spoil-americas-plans-to-retake-top500-crown/
I don't see why your celebrating, the USA hasn't been #1 for years, and will loose it again very very soon.
The FooKey METHOD :
http://foocrypt.net/the-fookey-method
The common flaws in ALL encryption technologies to date are :
1. Typing on a KeyBoard to enter the password
2. Clicking on the Mouse / Pointer device that controls the location of the cursor
3. Some person or device looking / recording your screen as you type the password
4. The human developing a password that is easily guess, or can be brute forced due to its length
5. Sharing the password with a third party to decrypt the data
6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself
FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.
The FooKey METHOD :
http://foocrypt.net/the-fookey-method
The common flaws in ALL encryption technologies to date are :
1. Typing on a KeyBoard to enter the password
2. Clicking on the Mouse / Pointer device that controls the location of the cursor
3. Some person or device looking / recording your screen as you type the password
4. The human developing a password that is easily guess, or can be brute forced due to its length
5. Sharing the password with a third party to decrypt the data
6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself
FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.
1,2,3 are mitigated by the FooKeyBoard, Auto Key Press and a simple combination of colors modifying the Cypher Key Control Text Window. The TopeSecretCypherKeyControlText Preference Setting enables your to have a such a configuration. All the Text is hidden until you click and drag the cursor over a text area revealing only the portion of the text window you choose.
4 is mitigated by the simple configurability of FooCrypt, the accept random data from an unlimited number of sources and following FooCrypt's DEFAULT settings of utilising a length up to the maximum
5 is mitigated by FooCrypt’s ability to intemperate any binary data as a source for creating a FooKey, hence sharing the FooKey, can be obfuscated by an act as simply as sending the third party :
A Photo
A Music file
A Document
A URL to a data source on the Internet / Intranet
The possibilities are endless
Then, all the third party has to do, is utilise FooCrypt’s Import Window Memory Binary Features, to recreate the FooKey.
Modifications to the imported binary import can be made with ease with FooCrypt’s XY features, enabling identical cursor position for character modifications to the binary import
6 can be mitigated by always storing your encrypted data on an encrypted media device, thus even if your media device is physically stolen, the thief needs to break the disk encryption, and then try to break FooCrypt’s Cyclical Encryption. FooKey’s are always stored on physical media, encrypted in a single layer of encryption. FooKey’s can easily be encrypted by the User with a FooKey, hence, layering the FooKey in multiple layers of encryption.
No one to date has been able to by pass or break into a file encrypted with the FooKey method.
I mentioned Angus the Cyber Minister twice in my review submission :
http://www.defence.gov.au/publications/reviews/tradecontrols/Submissions.asp
http://www.defence.gov.au/publications/reviews/tradecontrols/Docs/Mark_Lane.pdf
Male Bovinae Faeces [ BullShit ] & Case study # 7c5aba41f53293b712fd86d08ed5b36e
The escrow debate is bullshit being regurgetated & farmed down from the USA 'CLIPPER KEY / CHIP' from 25+ years ago. [ https://en.wikipedia.org/wiki/Clipper_chip ] along with the 'Munitions legislation' that was forced into the 'Wassenaar Arrangement’ that the stupid Liberals turned into the DTCA.
Be Protected, Get The FooKey METHOD : http://foocrypt.net/the-fookey-method
I've started a blog to discuss the DTC(Act) modifications being put forward to the Australian Parliament.
http://www.foocrypt.net/blog/defence-reviewing-13e
Having spent the last few years jumping through the Defence Controls around Cryptology, et al ( 13E, DTC(Act), Fairwork action, A.G.S.V.A. Data Breaches, Australian Signals Directorate delays and essentially requesting source code, Defence Export Controls ( who lost their Office ) delays, Australian Human Rights Cases, etc ), it's a much needed change to ensure innocent end users can obtain access to technologies to ensure a citizens privacy and not be sent to jail on the whim of a Minister in the sitting Australian Federal Government.
Current criminal penalties of up to 10 years in jail and .5 million in fines, for utilising software to ensure their privacy ( Cryptology ) is a ridiculous law effecting all within Australian borders.
https://forums.theregister.co.uk/forum/1/2017/09/05/australian_defence_export_controls_up_for_review/
Feel free to comment, send on, refer, etc.....