* Re: [gentoo-user] loop-aes + extra-ciphers...
@ 2008-06-25 17:58 Dirk Heinrichs
2008-06-25 18:59 ` Alan McKinnon
2008-06-25 20:31 ` Chris Walters
0 siblings, 2 replies; 23+ messages in thread
From: Dirk Heinrichs @ 2008-06-25 17:58 UTC (permalink / raw
To: gentoo-user
[-- Attachment #1: Type: text/plain, Size: 971 bytes --]
Am Mittwoch, 25. Juni 2008 schrieb Chris Walters:
> | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
> | etc) can break those algorithms relatively easy. On the other hand even
> | weaker algorithms can protect your data against laptop thieves.
>
> That's more than a rumor. Another three letter agency (NSA) has networks
> of supercomputers that can brute force a passphrase is little time. I am
> majoring in mathematics, and plan to specialize in cryptology.
If it is so easy for them to crack our ciphers (and the one they use
themselves, btw.), why doesn't Kasperky ask them to crack the key of the
GPCode virus which, according to Kaspersky's assumptions, would keep 15
million modern PCs busy for a year.
And, if it is so easy for them, it is as easy for other governments too,
right? That would mean they use a cipher that's easily crackable by other
governments. Do you really think they do?
Bye...
Dirk
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 189 bytes --]
^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 17:58 [gentoo-user] loop-aes + extra-ciphers Dirk Heinrichs @ 2008-06-25 18:59 ` Alan McKinnon 2008-06-25 20:31 ` Chris Walters 1 sibling, 0 replies; 23+ messages in thread From: Alan McKinnon @ 2008-06-25 18:59 UTC (permalink / raw To: gentoo-user On Wednesday 25 June 2008, Dirk Heinrichs wrote: > If it is so easy for them to crack our ciphers (and the one they use > themselves, btw.), why doesn't Kasperky ask them to crack the key of > the GPCode virus which, according to Kaspersky's assumptions, would > keep 15 million modern PCs busy for a year. There's an interesting side possibility to that one. It's entirely plausible that the key used to encrypt all those poor sucker Windows user's files isn't just any old key, but rather a very important public key that matches a private key the bad guys would like to have - like a CA's private key. Maybe cracking that key isn't such a good idea after all. I think this is a case for hose-pipe decryption. -- Alan McKinnon alan dot mckinnon at gmail dot com -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 17:58 [gentoo-user] loop-aes + extra-ciphers Dirk Heinrichs 2008-06-25 18:59 ` Alan McKinnon @ 2008-06-25 20:31 ` Chris Walters 2008-06-25 20:46 ` Alan McKinnon 1 sibling, 1 reply; 23+ messages in thread From: Chris Walters @ 2008-06-25 20:31 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Dirk Heinrichs wrote: | If it is so easy for them to crack our ciphers (and the one they use | themselves, btw.), why doesn't Kasperky ask them to crack the key of the | GPCode virus which, according to Kaspersky's assumptions, would keep 15 | million modern PCs busy for a year. | | And, if it is so easy for them, it is as easy for other governments too, | right? That would mean they use a cipher that's easily crackable by other | governments. Do you really think they do? I didn't say it was "easy". All I said is that it is possible, with enough resources, to crack keys. I very much doubt that the NSA would be interested in cracking the key of the GPCode virus, since they are more directed to the National Security of the US. As for other governments, if they have large networks of supercomputers, and cryptanalysis experts, then it would probably be just as probable that they could crack any key from any publicly used cipher algorithm. Regards, Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIYqsOAAoJEIAhA8M9p9DAnswP+QEM14WCclfIljkDDhRGJ/uU d/XJMrw7wyJxJ+jodCARFlBjnyzMYTNShIaX9jgWWQFOC85XMFAcjjeVejP7bcd5 kfmJyJFJeT0omH/68Mw7tiyN4Ft+ldovSIj2iJKU8BkLszd0E+wizM7MvIrPKyq0 xj5xZNJyimd7zSCE+F6+OHQJ+GrlMMrOv0YWUd9FrfWBW/GB635EU1KDg1YKrn4v 8goRTdS/ImtcXJTttRbOLwSCwi66Cv2RgK6BACeSxzxxkODeHy/qnKSnppxMfPxD X4WZz+i6VW7+diUJuGojWyFooFTL/RjJOprmAWsNM4V1R0sVsHqzIzwGZSa/BzIM J5Yzj5LQGpceP0qOVz4fAw41rEVliYlVxQNxEhlxt53UN3tQ5pGvayasZD1mLz6A QDBZNuQkeC2ggxLPOWF6/qRiLgjFXxZ4viiEDagCGhveGdSqu78DVvlOtCbkw78D pRdSxIU9Uc77Z7N5ZPpckHooX4argKLiPkyBpuU9alEHZd6KdjdSdFF4pPx73101 0baSIp4Ato0AZ/wciu9RIAtKwuwtlZ8bzcm3CxKeRJ1Fr6kLVoa0w3r1RkW+/T+C hFiaLAoLfnqdUrSBDAVUuEkL8W3OOPr1SRsYY9Pp1XNykEPqIsmV+OWgzooDCJly hUV5npf+EK4AjE5n7nc7 =Cvzy -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 20:31 ` Chris Walters @ 2008-06-25 20:46 ` Alan McKinnon 2008-06-25 20:54 ` Chris Walters 0 siblings, 1 reply; 23+ messages in thread From: Alan McKinnon @ 2008-06-25 20:46 UTC (permalink / raw To: gentoo-user On Wednesday 25 June 2008, Chris Walters wrote: > Dirk Heinrichs wrote: > | If it is so easy for them to crack our ciphers (and the one they > | use themselves, btw.), why doesn't Kasperky ask them to crack the > | key of the GPCode virus which, according to Kaspersky's > | assumptions, would keep 15 million modern PCs busy for a year. > | > | And, if it is so easy for them, it is as easy for other governments > | too, right? That would mean they use a cipher that's easily > | crackable by other governments. Do you really think they do? > > I didn't say it was "easy". All I said is that it is possible, with > enough resources, to crack keys. I very much doubt that the NSA > would be interested in cracking the key of the GPCode virus, since > they are more directed to the National Security of the US. > > As for other governments, if they have large networks of > supercomputers, and cryptanalysis experts, then it would probably be > just as probable that they could crack any key from any publicly used > cipher algorithm. This is the point where I start to ask for a citation and stop listening to theoretical possibilities and things that might possibly could be. Unless of course the exact meaning of phrases like "three hundred thousand million years" has a different meaning in your universe than it does in mine. -- Alan McKinnon alan dot mckinnon at gmail dot com -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 20:46 ` Alan McKinnon @ 2008-06-25 20:54 ` Chris Walters 2008-06-25 21:39 ` Alan McKinnon 0 siblings, 1 reply; 23+ messages in thread From: Chris Walters @ 2008-06-25 20:54 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Alan McKinnon wrote: | On Wednesday 25 June 2008, Chris Walters wrote: |> Dirk Heinrichs wrote: |> | If it is so easy for them to crack our ciphers (and the one they |> | use themselves, btw.), why doesn't Kasperky ask them to crack the |> | key of the GPCode virus which, according to Kaspersky's |> | assumptions, would keep 15 million modern PCs busy for a year. |> | |> | And, if it is so easy for them, it is as easy for other governments |> | too, right? That would mean they use a cipher that's easily |> | crackable by other governments. Do you really think they do? |> |> I didn't say it was "easy". All I said is that it is possible, with |> enough resources, to crack keys. I very much doubt that the NSA |> would be interested in cracking the key of the GPCode virus, since |> they are more directed to the National Security of the US. |> |> As for other governments, if they have large networks of |> supercomputers, and cryptanalysis experts, then it would probably be |> just as probable that they could crack any key from any publicly used |> cipher algorithm. | | This is the point where I start to ask for a citation and stop listening | to theoretical possibilities and things that might possibly could be. | Unless of course the exact meaning of phrases like "three hundred | thousand million years" has a different meaning in your universe than | it does in mine. Whom are you asking for a citation from? For which particular facts? Do you really doubt that the US NSA has a *lot* of supercomputers? Do you really doubt that they have experts in mathematics, cryptology, cryptanalysis, and cryptography experts on staff? Or perhaps you doubt that they can crack any keys at all... Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIYrCEAAoJEIAhA8M9p9DANokQAMVlJk0AoEa11ixiLCeNrEo/ RHkuMpHYeBpEAbWKhqqwdPZPE4voBdT70pbJeK5MXCoMNGpUopW4vYdtEv6WA88Q LaPHdr9RdOf0n/7LLr6el61sbe41S5DRHLFnh63c83v0hSjyJVir+WoaOMGh0psG wUist2SyPos7rNrgSs0MeOKM2/qSCpC0OF3HZmMQhPXVQQHSWC03T14EX+dTtSeb +oxZ8aky0sqzfjvc84ep7zM9WUxN+JFR7bjokpzOwryiZt729nMxa3SATCcJWvhH 6RHtAK4gK9tXbZJ/70Um7D98lPLTeilImYIVAANhpkA/MwB8UN2d9BHxTdnZ5iCs GRWAMFllDUFKTmCnx0yXkdP/UQA0VuJeqE2dVv1gn0wUft93I9fxQcGKkGc2X3r3 Vz7crUhLgVZyasXXMe5IRBr6ZbBsSX/f/2zGaTG/jDpFBBVUqV5JE1LBds0uMwre zvsRicdAuNV2yzFYkkbOzDsupJClHqWv/xqO4gcQqArtYXuMgrPlaiF+nibW5aeM 0tZfFsZk+CE7HkpNx6GPVoCk1hTao5LfZhcx/HNk7e0v0OV4I6YkO7beFLPK4oNM FXA2xIskjqBjjuAviP59oO0sMJYwuxH4E/DCjjxscqkzowoBc401SauK/1eeuCG4 1MAYx/+jN69eWKxMTmZT =N/8S -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 20:54 ` Chris Walters @ 2008-06-25 21:39 ` Alan McKinnon 2008-06-25 21:51 ` Chris Walters 0 siblings, 1 reply; 23+ messages in thread From: Alan McKinnon @ 2008-06-25 21:39 UTC (permalink / raw To: gentoo-user On Wednesday 25 June 2008, Chris Walters wrote: > | This is the point where I start to ask for a citation and stop > | listening to theoretical possibilities and things that might > | possibly could be. Unless of course the exact meaning of phrases > | like "three hundred thousand million years" has a different meaning > | in your universe than it does in mine. > > Whom are you asking for a citation from? I'm asking you to back up your totally unsubstantiated assertions that the NSA et al can rapidly crack decent cryptography > For which particular facts? Pick any one you like from your contribution to this thread. My favourite would be this one: "A final thought: It is a fact that both the US Navy and the NSA are *very* interested in cryptology and data security. The NSA also does have large networks of supercomputers that, using parallel, distributed or concurrent computing principles can crack keys more quickly than you may think." Now that's a pretty definite statement you made there. So, how quickly do you think I think they can do it? And how quickly can they actually do it? > Do you really doubt that the US NSA has a *lot* of supercomputers? Not at all, in fact I would hazard an educated guess that the NSA is the largest consumer of supercomputers in the world, and also that they are very reluctant to advertise the fact. I doubt any of their machines appear on the Top500 list. I say this as a natural deduction from knowing what they are mandated to do and how they would realistically go about doing it. > Do you really doubt that they have experts in mathematics, > cryptology, cryptanalysis, and cryptography experts on staff? Not at all, I would be stupid indeed to doubt that. As evidence, one only has to look at the vast amount of technical literature the NSA has published on the subject. > Or > perhaps you doubt that they can crack any keys at all... Don't get smart with me, jackass. Everyone here who knows a bit about cryptography knows that give enough time and resources any key can be cracked. I asked you to do a perfectly reasonable thing. You are asserting that the NSA can crack keys quickly, much quicker than the average geek thinks they can do it, but you provide no evidence of this other than your own assertion of it. You didn't even give any evidence of why I should consider you a credible and knowledgeable person in the field. Extraordinary assertions require extraordinary evidence and all that. I see 4 scenarios here: 1. You are perfectly correct and can back it up. In which case I'd like to read the evidence. 2. You are perfectly correct and have the evidence but cannot show it to me due to national security or NDA. That's fine, but do say so. 3. You are presenting your knowledgeable hunch/gut feel/opinion/hearsay evidence as fact. that's also fine, but do say so. 4. You are simply making stuff up in varying degrees. -- Alan McKinnon alan dot mckinnon at gmail dot com -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 21:39 ` Alan McKinnon @ 2008-06-25 21:51 ` Chris Walters 2008-06-25 21:57 ` Jason Rivard 2008-06-25 22:08 ` [gentoo-user] PEACE!!! Daniel Iliev 0 siblings, 2 replies; 23+ messages in thread From: Chris Walters @ 2008-06-25 21:51 UTC (permalink / raw To: gentoo-user Alan McKinnon wrote: >> Or >> perhaps you doubt that they can crack any keys at all... > > Don't get smart with me, jackass. Fuck off, shitehead. Call me a jackass, when I simply state facts you admitted to? You're a fucking idiot. Welcome to my ignore list. -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 21:51 ` Chris Walters @ 2008-06-25 21:57 ` Jason Rivard 2008-06-25 22:45 ` Alan McKinnon 2008-06-25 22:08 ` [gentoo-user] PEACE!!! Daniel Iliev 1 sibling, 1 reply; 23+ messages in thread From: Jason Rivard @ 2008-06-25 21:57 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 569 bytes --] On Wed, Jun 25, 2008 at 9:51 PM, Chris Walters <cjw2004d@comcast.net> wrote: > Alan McKinnon wrote: > >> Or perhaps you doubt that they can crack any keys at all... >>> >> >> Don't get smart with me, jackass. >> > > Fuck off, shitehead. Call me a jackass, when I simply state facts you > admitted to? You're a fucking idiot. Welcome to my ignore list. > > Now that was TOTALLY UNCALLED FOR! All he asked you to do is prove your ludicrous statements about the NSA being able to crack any key in a "short" amount of time. Wait for my private mail, Mr. Walters. Jase [-- Attachment #2: Type: text/html, Size: 1203 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 21:57 ` Jason Rivard @ 2008-06-25 22:45 ` Alan McKinnon 0 siblings, 0 replies; 23+ messages in thread From: Alan McKinnon @ 2008-06-25 22:45 UTC (permalink / raw To: gentoo-user On Wednesday 25 June 2008, Jason Rivard wrote: > Wait for my private mail, Mr. Walters. I wouldn't bother with a private mail Jason. Tomorrow Chris will calm down, take a deep breath and probably contribute to the list again. It pretty much always works that way. Maybe he's quick to anger. Well, so am I sometimes. But he certainly does not belong in that class of people who have nothing useful to contribute. -- Alan McKinnon alan dot mckinnon at gmail dot com -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] PEACE!!! 2008-06-25 21:51 ` Chris Walters 2008-06-25 21:57 ` Jason Rivard @ 2008-06-25 22:08 ` Daniel Iliev 2008-06-25 22:40 ` Chris Walters 1 sibling, 1 reply; 23+ messages in thread From: Daniel Iliev @ 2008-06-25 22:08 UTC (permalink / raw To: gentoo-user On Wed, 25 Jun 2008 17:51:53 -0400 Chris Walters <cjw2004d@comcast.net> wrote: > Alan McKinnon wrote: > >> Or > >> perhaps you doubt that they can crack any keys at all... > > > > Don't get smart with me, jackass. > > Fuck off, shitehead. Call me a jackass, when I simply state facts > you admitted to? You're a fucking idiot. Welcome to my ignore list. > WOW! Both of you! Come on, guys! What is this? I've never seen such thing here for all the years I'm on the list. Please calm down, we are supposed to be friends here, right? -- Best regards, Daniel -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] PEACE!!! 2008-06-25 22:08 ` [gentoo-user] PEACE!!! Daniel Iliev @ 2008-06-25 22:40 ` Chris Walters 2008-06-26 1:35 ` [gentoo-user] loop-aes Daniel Iliev 0 siblings, 1 reply; 23+ messages in thread From: Chris Walters @ 2008-06-25 22:40 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Daniel Iliev wrote: | On Wed, 25 Jun 2008 17:51:53 -0400 | Chris Walters <cjw2004d@comcast.net> wrote: |> Alan McKinnon wrote: [snip] | WOW! Both of you! Come on, guys! What is this? I've never seen such | thing here for all the years I'm on the list. | | Please calm down, we are supposed to be friends here, right? Sorry for the outburst. It just gets my dander up when someone calls me childish names on a discussion group like this. I thought we were all friends here - we have all chosen the same distribution (Gentoo), and we all often come here first when we have problems. I asked a simple question that grew into so much more. Never did get an answer to my simple question. For the record, I agree that AES256 is an extremely secure cipher, which is why I am using it. My original question was: Does anyone know how to compile the "extra-ciphers" package that you can find on the loop-aes SourceForge site. Regards, Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIYslFAAoJEIAhA8M9p9DAxXwQAOGzP8cvDre0vNsGFitE6d7Z 4T70sDV6K2Sz9Li7QpSuewbfzDtsV7h4SAHlsc3H6PRK0qnqNQ8d0871adAXFIFR dlYWNl4sHD2IDgXGVOosob5pw8CWPh4bKlPs5e67eys8ugc/gt+eiDHOdgTJ0fVY 9Y7cS20E1FhUumVp/Tzpqk4T9+eDWJ6ot4+M+jNcgzwYehmnaRTwxArmCac3kLHw wy1wFYW3dtlaTEUbzccalrS+d/8cSzRRzGKVLDX7WiqkKLzpfxy53xKQ55jnO9hy bqqMKKMZ7r1S9hpNtMBnx8WDyEnOBsZ3AuV+3CLiz4sSbKWKboTBti3FxVWwtINn 2lJDVMKB6pujhZugs1MlS5MGUrZ/j4itslOAuGXUFEsL34Wpvw3q/BPPkbc1NvWC 7BK7pHI7XIRmdVHr4fbMV5ltpvs0Dl+HB8jcFiXZb/yekwZIMs8AcGtTuCn3zuk8 4dAh6IGlhkv5sAsl8rAzR5lsVILM8SfKFREE4i3Eu5X4MBwTTMaSpEcjLSxdxXev KsB5nWdVTZMhOEnkjxz60Pq2uxzaJ5Vxvxzuvlvu54VGc5cc/XFvg/HdRa0CpZnO 61RuXPmUwCEEKctC/BoWa0SpFdTSUs1T+BQtBQ8/1OuUnGkFaCbhcfvlUGj4jOIm R6UutSxAUwn/rUedzzf1 =ndyG -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes 2008-06-25 22:40 ` Chris Walters @ 2008-06-26 1:35 ` Daniel Iliev 2008-06-26 2:30 ` Chris Walters 0 siblings, 1 reply; 23+ messages in thread From: Daniel Iliev @ 2008-06-26 1:35 UTC (permalink / raw To: gentoo-user On Wed, 25 Jun 2008 18:40:08 -0400 Chris Walters <cjw2004d@comcast.net> wrote: > My original question was: Does anyone know how to compile the > "extra-ciphers" package that you can find on the loop-aes SourceForge > site. The following works here: 1) ebuild `equery w loop-aes` unpack 2) cd $PORTDIR/sys-fs/loop-aes-<version>/work/loop-AES-<version>/ 3) make EXTRA_CIPHERS=y 4) cd ../../ 5) touch .compiled 6) cd 7) ebuild `equery w loop-aes` merge (I actually stopped only up to step 3, but it finished w/o error) Since you said something about lack of documentation about loop-aes, have you already found this? http://loop-aes.sourceforge.net/loop-AES.README NOTE: "In order to support AES and other ciphers, mount, umount, losetup, swapon and swapoff need to be patched and recompiled." There's a hope - Gentoo may provide a patched version of util-linux. In case those tools are not already patched I wouldn't go that far on a system which is not especially dedicated for this encryption test of yours. HTH -- Best regards, Daniel -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes 2008-06-26 1:35 ` [gentoo-user] loop-aes Daniel Iliev @ 2008-06-26 2:30 ` Chris Walters 2008-06-26 3:23 ` Daniel Iliev 0 siblings, 1 reply; 23+ messages in thread From: Chris Walters @ 2008-06-26 2:30 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Daniel Iliev wrote: | On Wed, 25 Jun 2008 18:40:08 -0400 | Chris Walters <cjw2004d@comcast.net> wrote: | | |> My original question was: Does anyone know how to compile the |> "extra-ciphers" package that you can find on the loop-aes SourceForge |> site. | | The following works here: | | 1) ebuild `equery w loop-aes` unpack | | 2) cd $PORTDIR/sys-fs/loop-aes-<version>/work/loop-AES-<version>/ | | 3) make EXTRA_CIPHERS=y | | 4) cd ../../ | | 5) touch .compiled | | 6) cd | | 7) ebuild `equery w loop-aes` merge | | | (I actually stopped only up to step 3, but it finished w/o error) | | | Since you said something about lack of documentation about loop-aes, | have you already found this? | | http://loop-aes.sourceforge.net/loop-AES.README | | | NOTE: "In order to support AES and other ciphers, mount, umount, | losetup, swapon and swapoff need to be patched and | recompiled." | | There's a hope - Gentoo may provide a patched version of util-linux. | In case those tools are not already patched I wouldn't go that far on | a system which is not especially dedicated for this encryption test of | yours. Thanks for this. I will give it a try, when I get a chance. It is not really an encryption test, as you put it, so much as it is frustration at not being able to get the extra ciphers to compile. Oh, and Gentoo already patches util-linux with the patch from loop-aes. One big problem that people are experiencing right now it that since the testing version of util-linux got bumped up, the old patch will not work anymore - this has to be fixed upstream, but I doubt they will do so until the new version of util-linux is proven stable. For some reason, the 2.6.24 kernel patch works with the 2.6.25 version of the kernel, probably because the files it changes have not yet changed. Regards, Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIYv89AAoJEIAhA8M9p9DABGIP/AkFjbXRxbpU3NP7PDxDJcSh q9YrrbF6Nma/LswbRGxZDk1wnze0r9Ger2j/irqzH1dscYsCYFmY5wYX2JhxYq4t CxdkV3WcbJ2QfhHmxoPbO1trz4lpfdyS3aG32RquIXVFfLG/gsSkD0m9j3l+UuG8 SatydhlezVfBKiMyIYEtZWbCf6Hm/rgAeLTSmMaqVAVkbwisdr6Kn3h1VGRlSxOO 8dPwwf0mu+zB+tydbpEPzIhpJJYEPtUoWYy6FhPJbCDj7IWDaMDjymCcaikPz88Q dHqn9gVTC0K5oI7nBJFAaryAu3p+h6QSQuBMSXHSJZ2GHNvRt7qduH/r+XfuIJcZ 3wnQ5vKbUSXDaDmnCWaG/UjXV1C60lyDDn6fh9AjxdvuqfmSur3DdunUCyupwtg2 51RPc3JxCSYPiop8NG1MYhO7qv5Z6R1NJg1VH9KwVPUVlB8K2KdE3RAmhzL6xC27 RkYHI4yLEN2CwThBG/kRmvc4MBAHTc7dY/fm/XZrsLhDzLIAGawKtOVaubNRID9Q m8GmyGMNyjhEpdra79aL9NUeNcZEyD12bJG/5OlFdl4nbeqCjVV+gok9ELNo3UIM g6mb2mPG/EiMgk0imKbVqjdmnlUKK5Wk3609NGEXPUmtN4pWvPgQPC0W8XQUg6dI NTZ/d7Lu23tw2t7lSoTj =2CfF -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes 2008-06-26 2:30 ` Chris Walters @ 2008-06-26 3:23 ` Daniel Iliev 0 siblings, 0 replies; 23+ messages in thread From: Daniel Iliev @ 2008-06-26 3:23 UTC (permalink / raw To: gentoo-user On Wed, 25 Jun 2008 22:30:25 -0400 Chris Walters <cjw2004d@comcast.net> wrote: > | The following works here: > | > | 1) ebuild `equery w loop-aes` unpack > | > | 2) cd $PORTDIR/sys-fs/loop-aes-<version>/work/loop-AES-<version>/ > | > | 3) make EXTRA_CIPHERS=y > | > | 4) cd ../../ > | > | 5) touch .compiled > | > | 6) cd > | > | 7) ebuild `equery w loop-aes` merge > | > | > | (I actually stopped only up to step 3, but it finished w/o error) > | > | > | Since you said something about lack of documentation about loop-aes, > | have you already found this? > | > | http://loop-aes.sourceforge.net/loop-AES.README > | > | > | NOTE: "In order to support AES and other ciphers, mount, umount, > | losetup, swapon and swapoff need to be patched and > | recompiled." > | > | There's a hope - Gentoo may provide a patched version of util-linux. > | In case those tools are not already patched I wouldn't go that far > | on a system which is not especially dedicated for this encryption > | test of yours. > > Thanks for this. I will give it a try, when I get a chance. Sorry, from your reply I saw there's an error in my message: Step 2 should read: "$PORTAGE_TMPDIR/portage" instead of "$PORTDIR" Anyways you'll see the correct directory for your system from the output of "ebuild unpack". My apologies and good luck. -- Best regards, Daniel -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* [gentoo-user] loop-aes + extra-ciphers... @ 2008-06-25 2:20 Chris Walters 2008-06-25 5:43 ` Dirk Heinrichs 2008-06-25 13:20 ` Daniel Iliev 0 siblings, 2 replies; 23+ messages in thread From: Chris Walters @ 2008-06-25 2:20 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Thanks to all who replied to my previous question. This question is related. Has anyone gotten the 'extra-ciphers' (you can get them from the loop-aes site) to compile with the loop-aes kernel patch in place? If so, could you give me a hint on how to do this? Also, someone said that it was possible to encrypt using multiple passphrases using dm-crypt. To be clear are we talking about the same type of multiple passphrases that can be used with AES and Serpent with loop-aes? In other words, you set up a number pg passphrases (64 or 65), and the first block uses the first passphrase, the second block uses the second one, etc. The 65th passpharse is added to the hash of the encryption passphrase. Also (as if that weren't enough), is it possible to encrypt the passphrases or keys in dm-crypt with gnupg, like it is with loop-aes? If so, please give examples. Regards, Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIYatgAAoJEIAhA8M9p9DAcpkQAIwEuT/aVkYSSEXhoYgE0nMb I4A/F4eyd/vUi7/uxgKjcB/zpepgpuidzBU+K3skKiEl8ktWqPmWdFrEYg0h2Wbj NfTrPDpCycKfHv3ikIRF492PhFmIGf8JbmRGRNr9q93suITVpXdOE0mfqZp90dwR c3yo/2rKPM4/uRSt3WzL1UutblBaaA7Z7PpuzrYfB3QFrCZWgCPmW8bdqohWibpv kY9N15O2dsB9Fm0c1De/teWoF6tVLEsCFOKLS8tDuwAMnabFWV4AveTMjk3xxOgx hjO3MbwSTBpjICX+xXOUItvqRI9hfh/bY5BWyxx3iTxY0HnonAiWcyXXaJpnqxUf 0FfbGKO8NVvDiFfCuvfXg7tYLM84yYrZtYIqk9WhjxzSGtZVoBRXlDO3VbsPyTf7 Im34qLzqlqLMpLYUh2w22yhAKo/Um2OEiC1/52HyZX5nPgxxMDbefOe0/Bb/Ua82 OW/TqFymuTvcq3QTUOeKCLnk1PEB6iHjDzUb24Sbhr/5y+WFTblLipCECwJENFD4 iRhUpeIOSr9wiOrrErQat8O7N30+NLLaTIYrMI21QgNlEPEfFIvFxLEP+PnMPRzY V9UjhYyBxBZyTVPEDjMvUPrTFJdgGFyw1kEnlu6znbSrtMMtH0+95bmOdJvCg1fH Fx0XyMbEsWMm8GpbjU0H =PrSp -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 2:20 [gentoo-user] loop-aes + extra-ciphers Chris Walters @ 2008-06-25 5:43 ` Dirk Heinrichs 2008-06-25 13:20 ` Daniel Iliev 1 sibling, 0 replies; 23+ messages in thread From: Dirk Heinrichs @ 2008-06-25 5:43 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 819 bytes --] Am Mittwoch, 25. Juni 2008 schrieb ext Chris Walters: > Also, someone said that it was possible to encrypt using multiple > passphrases using dm-crypt. That was me. To be correct: I wrote that with LUKS (which is based on dm-crypt) it is possible to use multiple keys (a key may be a passphrase or a keyfile on disk). LUKS does this by rserving the first block of an encrypted volume for meta data. Again: see http://luks.endorphin.org for the details. Bye... Dirk -- Dirk Heinrichs | Tel: +49 (0)162 234 3408 Configuration Manager | Fax: +49 (0)211 47068 111 Capgemini Deutschland | Mail: dirk.heinrichs@capgemini.com Wanheimerstraße 68 | Web: http://www.capgemini.com D-40468 Düsseldorf | ICQ#: 110037733 GPG Public Key C2E467BB | Keyserver: wwwkeys.pgp.net [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 189 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 2:20 [gentoo-user] loop-aes + extra-ciphers Chris Walters 2008-06-25 5:43 ` Dirk Heinrichs @ 2008-06-25 13:20 ` Daniel Iliev 2008-06-25 15:14 ` Chris Walters 1 sibling, 1 reply; 23+ messages in thread From: Daniel Iliev @ 2008-06-25 13:20 UTC (permalink / raw To: gentoo-user On Tue, 24 Jun 2008 22:20:20 -0400 Chris Walters <cjw2004d@comcast.net> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > Thanks to all who replied to my previous question. This question is > related. Has anyone gotten the 'extra-ciphers' (you can get them from > the loop-aes site) to compile with the loop-aes kernel patch in > place? If so, could you give me a hint on how to do this? Perhaps they appear as kernel modules? I'm just guessing. > Also, someone said that it was possible to encrypt using multiple > passphrases using dm-crypt. To be clear are we talking about the > same type of multiple passphrases that can be used with AES and > Serpent with loop-aes? Yes, you can have multiple passwords with dm-crypt-luks. > In other words, you set up a number pg > passphrases (64 or 65), and the first block uses the first > passphrase, the second block uses the second one, etc. The 65th > passpharse is added to the hash of the encryption passphrase. Never bothered to go so deep in the internals, but... I had a busyness laptop with non-sensitive (in my opinion) data, but the managers were quite paranoid about that, so I had to encrypt the drives to save myself the administrative trouble in case it was stolen. I followed the gentoo-wiki how-to [1] and found out that encrypting the hdd visibly slowed down the system. Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2], etc) can break those algorithms relatively easy. On the other hand even weaker algorithms can protect your data against laptop thieves. What I'm saying is that it is pointless to get very crazy about strong and heavy algorithms. After all if your enemies are not after your hardware, but after your data, they could always physically force you to reveal the password. > Also (as if that weren't enough), is it possible to encrypt the > passphrases or keys in dm-crypt with gnupg, like it is with > loop-aes? If so, please give examples. > Yes, you could do something like: head /dev/urandom | gpg --symmetric -a > key.gpg gpg --decrypt key.gpg | cryptsetup luksFormat /dev/some-block-device gpg --decrypt key.gpg | cryptsetup luksOpen /dev/some-block-device (The above commands are not correct, their sole purpose is to show the idea) [1] System Encryption DM-Crypt with LUKS: http://tinyurl.com/clrk6 [2] M.A.V.O.: http://tinyurl.com/4badqs ; http://tinyurl.com/4chhph :D -- Best regards, Daniel -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 13:20 ` Daniel Iliev @ 2008-06-25 15:14 ` Chris Walters 2008-06-25 18:51 ` Sebastian Wiesner 0 siblings, 1 reply; 23+ messages in thread From: Chris Walters @ 2008-06-25 15:14 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Daniel Iliev wrote: | On Tue, 24 Jun 2008 22:20:20 -0400 | Chris Walters <cjw2004d@comcast.net> wrote: [snip] | Perhaps they appear as kernel modules? I'm just guessing. I think that is how they are supposed to appear, but I can't seem to get them to compile, and the instructions are not too helpful. [snip] | Yes, you can have multiple passwords with dm-crypt-luks. That is good. [snip | Never bothered to go so deep in the internals, but... | | I had a busyness laptop with non-sensitive (in my opinion) data, but | the managers were quite paranoid about that, so I had to encrypt the | drives to save myself the administrative trouble in case it was stolen. | I followed the gentoo-wiki how-to [1] and found out that encrypting the | hdd visibly slowed down the system. | | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2], | etc) can break those algorithms relatively easy. On the other hand even | weaker algorithms can protect your data against laptop thieves. That's more than a rumor. Another three letter agency (NSA) has networks of supercomputers that can brute force a passphrase is little time. I am majoring in mathematics, and plan to specialize in cryptology. I doubt they'd let me publish an algorithm that is very hard to break... It is not that I'm terribly paranoid about people getting my data, I just want to make it a little harder. Of course, it is always possible to insert code that will send the unencrypted data, once you've logged on - not easy for the casual user, but for the guru, an easy thing. | What I'm saying is that it is pointless to get very crazy about strong | and heavy algorithms. After all if your enemies are not after your | hardware, but after your data, they could always physically force you | to reveal the password. Yes, I suppose that they could do that, using torture or something like that. [snip] | Yes, you could do something like: | | head /dev/urandom | gpg --symmetric -a > key.gpg | gpg --decrypt key.gpg | cryptsetup luksFormat /dev/some-block-device | gpg --decrypt key.gpg | cryptsetup luksOpen /dev/some-block-device | | | (The above commands are not correct, their sole purpose is to show the | idea) Thanks for the ideas, and for the links. I will be checking them out. | [1] System Encryption DM-Crypt with LUKS: http://tinyurl.com/clrk6 | | [2] M.A.V.O.: http://tinyurl.com/4badqs ; http://tinyurl.com/4chhph :D Regards, Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIYmDJAAoJEIAhA8M9p9DA0skQAOOPam7lkhP6q+8XstmaUX5s O0zIyEHyIjxi6o2cln60UVXFzac89VvJ4fXYWgA9KcagedGsbWCljp/92Xynyqng 3lnZUWPZPkr0+M5khbO8EKMfEOlx4klWkbXX7kbyNWiSs1b9uWoJJqcb7fpU0mc8 6/Z/4v2EmkTCML1UHdNYaJkeJL7Tr0OxfK0gt9V8xadcZAyJQbF1YpZCqtlBEpdn Fom/tSwgpNn8Lxj5KdbFuNimflDDs4MlOfIsPUTm95mxlTw79YvTg2zqKEzmEvFE Zu3q9867JbStBLUzWJ/sB1WdTWmULm8q1N4tgGC/si02lTHHkpNoX9Sey2fw/w2x CrGBqALNyl3Buh2jMZY4+ALEr+YKnKIZFEybQtKlj971vtrj9s6m6yQM0GUoy41g zzjuIBarrr0NYwZI2rGSF/9aSoksD7GD8JIeLlDuJMpRowwsuU50IwR7cBZ2LfpX heNoxLdUfCdzeXeKOtyoPJNIvDv1LxwuUvlcxXT9vbU/ufvznCzOXlpKyoOWuL29 +aKJVKtzM4wCX+suqJZqva3npyXQMWnk45MjhE7KNvFA8k/OfBZkdxJ9F187iJi1 UoVNeenYgwogC4Y5jXKXdPNdaiFfe+byrIAmdWZOFYhPMBKY5OXO/pVcgp6kfAMe DJDh7m7neS1/8IPmfmG0 =SUZm -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 15:14 ` Chris Walters @ 2008-06-25 18:51 ` Sebastian Wiesner 2008-06-25 20:25 ` Chris Walters 0 siblings, 1 reply; 23+ messages in thread From: Sebastian Wiesner @ 2008-06-25 18:51 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 1555 bytes --] Chris Walters <cjw2004d@comcast.net> at Wednesday 25 June 2008, 17:14:20 > | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2], > | etc) can break those algorithms relatively easy. On the other hand even > | weaker algorithms can protect your data against laptop thieves. You had better used the acronym FUD instead of the word "rumor". US government itself has declared Rijndael 256 sufficient for classified information up to top secret. This level of security is shared among all AES finalists like RC6 or Serpent. > That's more than a rumor. Another three letter agency (NSA) has networks > of supercomputers that can brute force a passphrase is little time. Bruteforcing a _passphrase_ is not the same as bruteforcing a key. An both of these don't have nothing to do with the algorithm itself. They are side-attacks ... a weak passphrase is user idiocity, not a cipher weakness. > It is not that I'm terribly paranoid about people getting my data, I just > want to make it a little harder. What's the point in making the impossible even harder? > Of course, it is always possible to insert code that will send the > unencrypted data, once you've logged on - not easy for the casual user, > but for the guru, an easy thing. That's operating system security and has nothing to do with cryptology. Someone having only your hard disk can't inject a rootkit into the system. -- Freedom is always the freedom of dissenters. (Rosa Luxemburg) [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 18:51 ` Sebastian Wiesner @ 2008-06-25 20:25 ` Chris Walters 2008-06-25 21:24 ` Sebastian Wiesner 0 siblings, 1 reply; 23+ messages in thread From: Chris Walters @ 2008-06-25 20:25 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Sebastian Wiesner wrote: | Chris Walters <cjw2004d@comcast.net> at Wednesday 25 June 2008, 17:14:20 | |> | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2], |> | etc) can break those algorithms relatively easy. On the other hand even |> | weaker algorithms can protect your data against laptop thieves. | | You had better used the acronym FUD instead of the word "rumor". US | government itself has declared Rijndael 256 sufficient for classified | information up to top secret. This level of security is shared among all | AES finalists like RC6 or Serpent. | |> That's more than a rumor. Another three letter agency (NSA) has networks |> of supercomputers that can brute force a passphrase is little time. | | Bruteforcing a _passphrase_ is not the same as bruteforcing a key. An both | of these don't have nothing to do with the algorithm itself. They are | side-attacks ... a weak passphrase is user idiocity, not a cipher | weakness. | |> It is not that I'm terribly paranoid about people getting my data, I just |> want to make it a little harder. | | What's the point in making the impossible even harder? | |> Of course, it is always possible to insert code that will send the |> unencrypted data, once you've logged on - not easy for the casual user, |> but for the guru, an easy thing. | | That's operating system security and has nothing to do with cryptology. | Someone having only your hard disk can't inject a rootkit into the system. Are you a cryptology expert? By the way, nothing is impossible. The only thing that cryptography attempts to do is reduce the **probability** of cracking the key and gaining access to the data as low as possible. As for brute forcing a passphrase: Since most implementations of AES (Rijndael) use a hash of the passphrase to form the key, it amounts to the same thing, in practice, as cracking the key. Cryptology is, at least partly about finding the weakest link, because that is what is likely to be attacked in any cryptosystem. If the weakest link is system security or a weak passphrase, then that weakness translates to a weakness in anything encrypted in such an environment. The US Government only keeps classified information on non-networked computers in secure environments, so the cipher used does not matter as much as the other security measures taken to ensure that the data does not fall into the wrong hands. A final thought: It is a fact that both the US Navy and the NSA are *very* interested in cryptology and data security. The NSA also does have large networks of supercomputers that, using parallel, distributed or concurrent computing principles can crack keys more quickly than you may think. Regards, Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIYqmqAAoJEIAhA8M9p9DAIo8P/A17VwmkVsscVgfFzpCVDQbw 69WHMmoUvn5GasVRiM2JUi2UeEDpzCuLNxYlQglFWhyvsbplV3aiJmtzVdbEitsK hpf7Jt0wNvzi25Cye/j2DJlkGh7PTGRCkrMkoirgg+JTSFC21TzAnJZSUQH3Zhv8 Inb1C53jl8/RV1KTdPOX2W/hNo1VCPfpFnhxhad8fzj59pM1UwMVktwAQtO1JmOW fQm3/mSbeLyr0L5ZKPlc5shao/QVZ7Zo9xTDU8PFrBCmmt93MODGdbaOY7IsCmsl 6vWfWi1suV1a9ptPpU9ohn7YZtHlEboRMb4/mHCsj46SsI9cOo1KVLpqfiQZxd1t U1niZU8Cb67+cvEDcQ/q1eIGDMza01NR8UxtF66vHB8WrGKpLYs+ckHqJg9+hgF5 nUiY2RHeyNd3lh4vUWCY15Kh9OfK/LlL9IvGZV2Vpc066aa/EfC3AyiSSc+cMMx9 r4GQijL3wfKaDY9OUh6hJZcSZpBNTZezQ1sNZNMOm0TgDLGtJNMv5ltHjtZnxmbC Fus0IRrQVYvXT8ADZW80Ic256RWtUvn73WjBevYswa2T/Oc3o/NWc2sMrxEg8FVs a7nCa4ErSKIWRbMHTuTZLO3l6+XXjXm0sHk0qQ4JfFNkoV4gyMZq36HelAb2GsRu 7NJKaZIXlOCuNiYByLfp =wp+F -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 20:25 ` Chris Walters @ 2008-06-25 21:24 ` Sebastian Wiesner 2008-06-25 21:53 ` Jason Rivard 0 siblings, 1 reply; 23+ messages in thread From: Sebastian Wiesner @ 2008-06-25 21:24 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 3569 bytes --] Chris Walters <cjw2004d@comcast.net> at Wednesday 25 June 2008, 22:25:18 > Are you a cryptology expert? Are you then? > The only thing that cryptography attempts to do is reduce the > **probability** of cracking the key and gaining access to the data as low > as possible. No news. That's, why cryptology defines "security" not as "being impossible to crack", but as "being sufficiently improbable to crack". The only cipher, that can't be "brute-forced", is the OTP, which is considered "perfectly secure". > As for brute forcing a passphrase: Since most implementations of AES > (Rijndael) use a hash of the passphrase to form the key, it amounts to > the same thing, in practice, as cracking the key. First of all, you can perform hard disk encryption _without_ a passphrase. You can store keyfiles on smart cards, usb sticks, etc. In this case, you can generate a _truely random_ key. Using a passphrase is the most insecure approach, but still, with a sufficiently random passphrase, you can gain a level of security, that even the NSA will find difficult to come around. The randomness of a 30-char passphrase does of course by far not match the randomness of a 256-bit key, so there is a real chance, that it can be guessed by brute force. Still it will take much cpu time, which is not endless, even to the NSA. In such a case, the question is, if the data, you ciphered, is really worth the effort of putting a super computer into work for a long time to try any possible passphrase. > Cryptology is, at least partly about finding the weakest link, because > that is what is likely to be attacked in any cryptosystem. Of course, absolutely true. Hard disk encryption is by far not perfect, just look at the cold boot attacks that gained public interest in the last time. But you didn't talk of _cryptosystems_ in your previous posts, you did talk about _algorithms_. Summarizing, the modern ciphers themselves are secure, as there is mostly no way to crack them save a brute-force attack on the key. On the other hand, cryptosystems built around these algorithms can of course contain weaknesses and holes, like weak passphrases, unsecure key storage, etc. > The US Government only keeps classified information on non-networked > computers in secure environments, so the cipher used does not matter as > much as the other security measures taken to ensure that the data does > not fall into the wrong hands. May be. I do not know, which restrictions apply to US classified data, I only know about official statements, the US government made towards the security of AES. > A final thought: It is a fact that both the US Navy and the NSA are > *very* interested in cryptology and data security. The NSA also does > have large networks of supercomputers that, using parallel, distributed > or concurrent computing principles can crack keys more quickly than you > may think. You can use simple mathematics to find out, that even the largest super computers, having one peta flop, needs millions of years to perform an exhaustive search through AES key space. Anyway, you may believe, what you want to believe, I'm just reflecting, what real experts like Bruce Schneier have been telling for years: It's wrong to trust into simple ciphers, but it's equally wrong, to believe, that anything can be broken. my 2 cents -- Freedom is always the freedom of dissenters. (Rosa Luxemburg) [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 21:24 ` Sebastian Wiesner @ 2008-06-25 21:53 ` Jason Rivard 2008-06-25 22:10 ` Sebastian Wiesner 0 siblings, 1 reply; 23+ messages in thread From: Jason Rivard @ 2008-06-25 21:53 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 5075 bytes --] On Wed, Jun 25, 2008 at 9:24 PM, Sebastian Wiesner <basti.wiesner@gmx.net> wrote: > Chris Walters <cjw2004d@comcast.net> at Wednesday 25 June 2008, 22:25:18 > > Are you a cryptology expert? > > Are you then? I doubt that either of you are cryptology experts. I've known a few, and I am a crypto-expert, who has worked for the government of the US. > > > The only thing that cryptography attempts to do is reduce the > > **probability** of cracking the key and gaining access to the data as low > > as possible. > > No news. That's, why cryptology defines "security" not as "being > impossible > to crack", but as "being sufficiently improbable to crack". The only > cipher, that can't be "brute-forced", is the OTP, which is > considered "perfectly secure". There is no such thing as perfectly secure, but a cipher algorithm that would take *all* the computers on Earth a year or more to crack is pretty secure. > > > As for brute forcing a passphrase: Since most implementations of AES > > (Rijndael) use a hash of the passphrase to form the key, it amounts to > > the same thing, in practice, as cracking the key. > > First of all, you can perform hard disk encryption _without_ a passphrase. > You can store keyfiles on smart cards, usb sticks, etc. In this case, you > can generate a _truely random_ key. > > Using a passphrase is the most insecure approach, but still, with a > sufficiently random passphrase, you can gain a level of security, that even > the NSA will find difficult to come around. > > The randomness of a 30-char passphrase does of course by far not match the > randomness of a 256-bit key, so there is a real chance, that it can be > guessed by brute force. Still it will take much cpu time, which is not > endless, even to the NSA. I don't think I can really comment on this, except to say that smart cards and usb thumb drives are the way to go for security. As long as you can keep control of the device. > > In such a case, the question is, if the data, you ciphered, is really worth > the effort of putting a super computer into work for a long time to try any > possible passphrase. Mr. Walters' claim is not that they would put a single super-computer to decrypting it, but a "network of supercomputers". I truly don't think you have to worry about that occurring, unless you are deemed a danger to US National Security. Even then, AES is very hard to crack. The major weakness is the person who encrypts the data. Under questioning, most will give up their keys. > > > Cryptology is, at least partly about finding the weakest link, because > > that is what is likely to be attacked in any cryptosystem. > > Of course, absolutely true. Hard disk encryption is by far not perfect, > just look at the cold boot attacks that gained public interest in the last > time. But you didn't talk of _cryptosystems_ in your previous posts, you > did talk about _algorithms_. By themselves algorithms are relatively useless. It is only the application of those algorithms that make them useful. In this case, Mr. Walters pointed out how *NOT* to apply cipher algorithms. Some of the ways, anyway. > > Summarizing, the modern ciphers themselves are secure, as there is mostly > no > way to crack them save a brute-force attack on the key. On the other hand, > cryptosystems built around these algorithms can of course contain > weaknesses and holes, like weak passphrases, unsecure key storage, etc. > > > The US Government only keeps classified information on non-networked > > computers in secure environments, so the cipher used does not matter as > > much as the other security measures taken to ensure that the data does > > not fall into the wrong hands. > > May be. I do not know, which restrictions apply to US classified data, I > only know about official statements, the US government made towards the > security of AES. I can neither confirm nor deny Mr. Walters' statement. I will state that the United States Government does, in fact, use ciphers to communicate with Embassies, Military Camps and Bases abroad, and Naval vessels. That hardly fits Mr. Walters' statement. > > > A final thought: It is a fact that both the US Navy and the NSA are > > *very* interested in cryptology and data security. The NSA also does > > have large networks of supercomputers that, using parallel, distributed > > or concurrent computing principles can crack keys more quickly than you > > may think. > > You can use simple mathematics to find out, that even the largest super > computers, having one peta flop, needs millions of years to perform an > exhaustive search through AES key space. > > Anyway, you may believe, what you want to believe, I'm just reflecting, > what > real experts like Bruce Schneier have been telling for years: It's wrong > to trust into simple ciphers, but it's equally wrong, to believe, that > anything can be broken. It is equally wrong to believe that any cipher is immune to attack, but it is not nearly as easy as Mr. Walters would have you believe. > > > my 2 cents > My nickel... Jase [-- Attachment #2: Type: text/html, Size: 6872 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 21:53 ` Jason Rivard @ 2008-06-25 22:10 ` Sebastian Wiesner 0 siblings, 0 replies; 23+ messages in thread From: Sebastian Wiesner @ 2008-06-25 22:10 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 3317 bytes --] "Jason Rivard" <jase.rivard@gmail.com> at Wednesday 25 June 2008, 23:53:23 > > > The only thing that cryptography attempts to do is reduce the > > > **probability** of cracking the key and gaining access to the data as > > > low as possible. > > > > No news. That's, why cryptology defines "security" not as "being > > impossible > > to crack", but as "being sufficiently improbable to crack". The only > > cipher, that can't be "brute-forced", is the OTP, which is > > considered "perfectly secure". > > There is no such thing as perfectly secure, A OTP cannot be broken using brute force, so the term "perfectly secure" fits here, imho, at least a bit ;) > > In such a case, the question is, if the data, you ciphered, is really > > worth the effort of putting a super computer into work for a long time > > to try any possible passphrase. > > Mr. Walters' claim is not that they would put a single super-computer to > decrypting it, but a "network of supercomputers". Does that difference really matter for ciphers like AES or at least for brute-force attacks on random 256-bit keys? > I truly don't think you > have to worry about that occurring, unless you are deemed a danger to US > National Security. Even then, AES is very hard to crack. The major > weakness is the person who encrypts the data. Under questioning, most > will give up their keys. > > > > Cryptology is, at least partly about finding the weakest link, > > > because that is what is likely to be attacked in any cryptosystem. > > > > Of course, absolutely true. Hard disk encryption is by far not > > perfect, just look at the cold boot attacks that gained public interest > > in the last time. But you didn't talk of _cryptosystems_ in your > > previous posts, you did talk about _algorithms_. > > By themselves algorithms are relatively useless. It is only the > application of those algorithms that make them useful. Still, there is a difference between the algorithm as such and a cryptosystem applying this algorithm. Btw, apart from general stuff like weak passphrases, that apply to most cryptosystems, really bad leaks often came from weak algorithms. Consider WEP. > > > A final thought: It is a fact that both the US Navy and the NSA are > > > *very* interested in cryptology and data security. The NSA also does > > > have large networks of supercomputers that, using parallel, > > > distributed or concurrent computing principles can crack keys more > > > quickly than you may think. > > > > You can use simple mathematics to find out, that even the largest super > > computers, having one peta flop, needs millions of years to perform an > > exhaustive search through AES key space. > > > > Anyway, you may believe, what you want to believe, I'm just reflecting, > > what > > real experts like Bruce Schneier have been telling for years: It's > > wrong to trust into simple ciphers, but it's equally wrong, to believe, > > that anything can be broken. > > It is equally wrong to believe that any cipher is immune to attack I don't and I did not say so, things like the Debian disaster bring you back to reality from dreams ... -- Freedom is always the freedom of dissenters. (Rosa Luxemburg) [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
end of thread, other threads:[~2008-06-26 3:23 UTC | newest] Thread overview: 23+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2008-06-25 17:58 [gentoo-user] loop-aes + extra-ciphers Dirk Heinrichs 2008-06-25 18:59 ` Alan McKinnon 2008-06-25 20:31 ` Chris Walters 2008-06-25 20:46 ` Alan McKinnon 2008-06-25 20:54 ` Chris Walters 2008-06-25 21:39 ` Alan McKinnon 2008-06-25 21:51 ` Chris Walters 2008-06-25 21:57 ` Jason Rivard 2008-06-25 22:45 ` Alan McKinnon 2008-06-25 22:08 ` [gentoo-user] PEACE!!! Daniel Iliev 2008-06-25 22:40 ` Chris Walters 2008-06-26 1:35 ` [gentoo-user] loop-aes Daniel Iliev 2008-06-26 2:30 ` Chris Walters 2008-06-26 3:23 ` Daniel Iliev -- strict thread matches above, loose matches on Subject: below -- 2008-06-25 2:20 [gentoo-user] loop-aes + extra-ciphers Chris Walters 2008-06-25 5:43 ` Dirk Heinrichs 2008-06-25 13:20 ` Daniel Iliev 2008-06-25 15:14 ` Chris Walters 2008-06-25 18:51 ` Sebastian Wiesner 2008-06-25 20:25 ` Chris Walters 2008-06-25 21:24 ` Sebastian Wiesner 2008-06-25 21:53 ` Jason Rivard 2008-06-25 22:10 ` Sebastian Wiesner
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox