* [gentoo-user] loop-aes + extra-ciphers... @ 2008-06-25 2:20 Chris Walters 2008-06-25 5:43 ` Dirk Heinrichs 2008-06-25 13:20 ` Daniel Iliev 0 siblings, 2 replies; 31+ messages in thread From: Chris Walters @ 2008-06-25 2:20 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Thanks to all who replied to my previous question. This question is related. Has anyone gotten the 'extra-ciphers' (you can get them from the loop-aes site) to compile with the loop-aes kernel patch in place? If so, could you give me a hint on how to do this? Also, someone said that it was possible to encrypt using multiple passphrases using dm-crypt. To be clear are we talking about the same type of multiple passphrases that can be used with AES and Serpent with loop-aes? In other words, you set up a number pg passphrases (64 or 65), and the first block uses the first passphrase, the second block uses the second one, etc. The 65th passpharse is added to the hash of the encryption passphrase. Also (as if that weren't enough), is it possible to encrypt the passphrases or keys in dm-crypt with gnupg, like it is with loop-aes? If so, please give examples. Regards, Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIYatgAAoJEIAhA8M9p9DAcpkQAIwEuT/aVkYSSEXhoYgE0nMb I4A/F4eyd/vUi7/uxgKjcB/zpepgpuidzBU+K3skKiEl8ktWqPmWdFrEYg0h2Wbj NfTrPDpCycKfHv3ikIRF492PhFmIGf8JbmRGRNr9q93suITVpXdOE0mfqZp90dwR c3yo/2rKPM4/uRSt3WzL1UutblBaaA7Z7PpuzrYfB3QFrCZWgCPmW8bdqohWibpv kY9N15O2dsB9Fm0c1De/teWoF6tVLEsCFOKLS8tDuwAMnabFWV4AveTMjk3xxOgx hjO3MbwSTBpjICX+xXOUItvqRI9hfh/bY5BWyxx3iTxY0HnonAiWcyXXaJpnqxUf 0FfbGKO8NVvDiFfCuvfXg7tYLM84yYrZtYIqk9WhjxzSGtZVoBRXlDO3VbsPyTf7 Im34qLzqlqLMpLYUh2w22yhAKo/Um2OEiC1/52HyZX5nPgxxMDbefOe0/Bb/Ua82 OW/TqFymuTvcq3QTUOeKCLnk1PEB6iHjDzUb24Sbhr/5y+WFTblLipCECwJENFD4 iRhUpeIOSr9wiOrrErQat8O7N30+NLLaTIYrMI21QgNlEPEfFIvFxLEP+PnMPRzY V9UjhYyBxBZyTVPEDjMvUPrTFJdgGFyw1kEnlu6znbSrtMMtH0+95bmOdJvCg1fH Fx0XyMbEsWMm8GpbjU0H =PrSp -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 2:20 [gentoo-user] loop-aes + extra-ciphers Chris Walters @ 2008-06-25 5:43 ` Dirk Heinrichs 2008-06-25 13:20 ` Daniel Iliev 1 sibling, 0 replies; 31+ messages in thread From: Dirk Heinrichs @ 2008-06-25 5:43 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 819 bytes --] Am Mittwoch, 25. Juni 2008 schrieb ext Chris Walters: > Also, someone said that it was possible to encrypt using multiple > passphrases using dm-crypt. That was me. To be correct: I wrote that with LUKS (which is based on dm-crypt) it is possible to use multiple keys (a key may be a passphrase or a keyfile on disk). LUKS does this by rserving the first block of an encrypted volume for meta data. Again: see http://luks.endorphin.org for the details. Bye... Dirk -- Dirk Heinrichs | Tel: +49 (0)162 234 3408 Configuration Manager | Fax: +49 (0)211 47068 111 Capgemini Deutschland | Mail: dirk.heinrichs@capgemini.com Wanheimerstraße 68 | Web: http://www.capgemini.com D-40468 Düsseldorf | ICQ#: 110037733 GPG Public Key C2E467BB | Keyserver: wwwkeys.pgp.net [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 189 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 2:20 [gentoo-user] loop-aes + extra-ciphers Chris Walters 2008-06-25 5:43 ` Dirk Heinrichs @ 2008-06-25 13:20 ` Daniel Iliev 2008-06-25 15:14 ` Chris Walters 1 sibling, 1 reply; 31+ messages in thread From: Daniel Iliev @ 2008-06-25 13:20 UTC (permalink / raw To: gentoo-user On Tue, 24 Jun 2008 22:20:20 -0400 Chris Walters <cjw2004d@comcast.net> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > Thanks to all who replied to my previous question. This question is > related. Has anyone gotten the 'extra-ciphers' (you can get them from > the loop-aes site) to compile with the loop-aes kernel patch in > place? If so, could you give me a hint on how to do this? Perhaps they appear as kernel modules? I'm just guessing. > Also, someone said that it was possible to encrypt using multiple > passphrases using dm-crypt. To be clear are we talking about the > same type of multiple passphrases that can be used with AES and > Serpent with loop-aes? Yes, you can have multiple passwords with dm-crypt-luks. > In other words, you set up a number pg > passphrases (64 or 65), and the first block uses the first > passphrase, the second block uses the second one, etc. The 65th > passpharse is added to the hash of the encryption passphrase. Never bothered to go so deep in the internals, but... I had a busyness laptop with non-sensitive (in my opinion) data, but the managers were quite paranoid about that, so I had to encrypt the drives to save myself the administrative trouble in case it was stolen. I followed the gentoo-wiki how-to [1] and found out that encrypting the hdd visibly slowed down the system. Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2], etc) can break those algorithms relatively easy. On the other hand even weaker algorithms can protect your data against laptop thieves. What I'm saying is that it is pointless to get very crazy about strong and heavy algorithms. After all if your enemies are not after your hardware, but after your data, they could always physically force you to reveal the password. > Also (as if that weren't enough), is it possible to encrypt the > passphrases or keys in dm-crypt with gnupg, like it is with > loop-aes? If so, please give examples. > Yes, you could do something like: head /dev/urandom | gpg --symmetric -a > key.gpg gpg --decrypt key.gpg | cryptsetup luksFormat /dev/some-block-device gpg --decrypt key.gpg | cryptsetup luksOpen /dev/some-block-device (The above commands are not correct, their sole purpose is to show the idea) [1] System Encryption DM-Crypt with LUKS: http://tinyurl.com/clrk6 [2] M.A.V.O.: http://tinyurl.com/4badqs ; http://tinyurl.com/4chhph :D -- Best regards, Daniel -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 13:20 ` Daniel Iliev @ 2008-06-25 15:14 ` Chris Walters 2008-06-25 18:51 ` Sebastian Wiesner 0 siblings, 1 reply; 31+ messages in thread From: Chris Walters @ 2008-06-25 15:14 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Daniel Iliev wrote: | On Tue, 24 Jun 2008 22:20:20 -0400 | Chris Walters <cjw2004d@comcast.net> wrote: [snip] | Perhaps they appear as kernel modules? I'm just guessing. I think that is how they are supposed to appear, but I can't seem to get them to compile, and the instructions are not too helpful. [snip] | Yes, you can have multiple passwords with dm-crypt-luks. That is good. [snip | Never bothered to go so deep in the internals, but... | | I had a busyness laptop with non-sensitive (in my opinion) data, but | the managers were quite paranoid about that, so I had to encrypt the | drives to save myself the administrative trouble in case it was stolen. | I followed the gentoo-wiki how-to [1] and found out that encrypting the | hdd visibly slowed down the system. | | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2], | etc) can break those algorithms relatively easy. On the other hand even | weaker algorithms can protect your data against laptop thieves. That's more than a rumor. Another three letter agency (NSA) has networks of supercomputers that can brute force a passphrase is little time. I am majoring in mathematics, and plan to specialize in cryptology. I doubt they'd let me publish an algorithm that is very hard to break... It is not that I'm terribly paranoid about people getting my data, I just want to make it a little harder. Of course, it is always possible to insert code that will send the unencrypted data, once you've logged on - not easy for the casual user, but for the guru, an easy thing. | What I'm saying is that it is pointless to get very crazy about strong | and heavy algorithms. After all if your enemies are not after your | hardware, but after your data, they could always physically force you | to reveal the password. Yes, I suppose that they could do that, using torture or something like that. [snip] | Yes, you could do something like: | | head /dev/urandom | gpg --symmetric -a > key.gpg | gpg --decrypt key.gpg | cryptsetup luksFormat /dev/some-block-device | gpg --decrypt key.gpg | cryptsetup luksOpen /dev/some-block-device | | | (The above commands are not correct, their sole purpose is to show the | idea) Thanks for the ideas, and for the links. I will be checking them out. | [1] System Encryption DM-Crypt with LUKS: http://tinyurl.com/clrk6 | | [2] M.A.V.O.: http://tinyurl.com/4badqs ; http://tinyurl.com/4chhph :D Regards, Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIYmDJAAoJEIAhA8M9p9DA0skQAOOPam7lkhP6q+8XstmaUX5s O0zIyEHyIjxi6o2cln60UVXFzac89VvJ4fXYWgA9KcagedGsbWCljp/92Xynyqng 3lnZUWPZPkr0+M5khbO8EKMfEOlx4klWkbXX7kbyNWiSs1b9uWoJJqcb7fpU0mc8 6/Z/4v2EmkTCML1UHdNYaJkeJL7Tr0OxfK0gt9V8xadcZAyJQbF1YpZCqtlBEpdn Fom/tSwgpNn8Lxj5KdbFuNimflDDs4MlOfIsPUTm95mxlTw79YvTg2zqKEzmEvFE Zu3q9867JbStBLUzWJ/sB1WdTWmULm8q1N4tgGC/si02lTHHkpNoX9Sey2fw/w2x CrGBqALNyl3Buh2jMZY4+ALEr+YKnKIZFEybQtKlj971vtrj9s6m6yQM0GUoy41g zzjuIBarrr0NYwZI2rGSF/9aSoksD7GD8JIeLlDuJMpRowwsuU50IwR7cBZ2LfpX heNoxLdUfCdzeXeKOtyoPJNIvDv1LxwuUvlcxXT9vbU/ufvznCzOXlpKyoOWuL29 +aKJVKtzM4wCX+suqJZqva3npyXQMWnk45MjhE7KNvFA8k/OfBZkdxJ9F187iJi1 UoVNeenYgwogC4Y5jXKXdPNdaiFfe+byrIAmdWZOFYhPMBKY5OXO/pVcgp6kfAMe DJDh7m7neS1/8IPmfmG0 =SUZm -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 15:14 ` Chris Walters @ 2008-06-25 18:51 ` Sebastian Wiesner 2008-06-25 20:25 ` Chris Walters 0 siblings, 1 reply; 31+ messages in thread From: Sebastian Wiesner @ 2008-06-25 18:51 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 1555 bytes --] Chris Walters <cjw2004d@comcast.net> at Wednesday 25 June 2008, 17:14:20 > | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2], > | etc) can break those algorithms relatively easy. On the other hand even > | weaker algorithms can protect your data against laptop thieves. You had better used the acronym FUD instead of the word "rumor". US government itself has declared Rijndael 256 sufficient for classified information up to top secret. This level of security is shared among all AES finalists like RC6 or Serpent. > That's more than a rumor. Another three letter agency (NSA) has networks > of supercomputers that can brute force a passphrase is little time. Bruteforcing a _passphrase_ is not the same as bruteforcing a key. An both of these don't have nothing to do with the algorithm itself. They are side-attacks ... a weak passphrase is user idiocity, not a cipher weakness. > It is not that I'm terribly paranoid about people getting my data, I just > want to make it a little harder. What's the point in making the impossible even harder? > Of course, it is always possible to insert code that will send the > unencrypted data, once you've logged on - not easy for the casual user, > but for the guru, an easy thing. That's operating system security and has nothing to do with cryptology. Someone having only your hard disk can't inject a rootkit into the system. -- Freedom is always the freedom of dissenters. (Rosa Luxemburg) [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 18:51 ` Sebastian Wiesner @ 2008-06-25 20:25 ` Chris Walters 2008-06-25 21:24 ` Sebastian Wiesner 0 siblings, 1 reply; 31+ messages in thread From: Chris Walters @ 2008-06-25 20:25 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Sebastian Wiesner wrote: | Chris Walters <cjw2004d@comcast.net> at Wednesday 25 June 2008, 17:14:20 | |> | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2], |> | etc) can break those algorithms relatively easy. On the other hand even |> | weaker algorithms can protect your data against laptop thieves. | | You had better used the acronym FUD instead of the word "rumor". US | government itself has declared Rijndael 256 sufficient for classified | information up to top secret. This level of security is shared among all | AES finalists like RC6 or Serpent. | |> That's more than a rumor. Another three letter agency (NSA) has networks |> of supercomputers that can brute force a passphrase is little time. | | Bruteforcing a _passphrase_ is not the same as bruteforcing a key. An both | of these don't have nothing to do with the algorithm itself. They are | side-attacks ... a weak passphrase is user idiocity, not a cipher | weakness. | |> It is not that I'm terribly paranoid about people getting my data, I just |> want to make it a little harder. | | What's the point in making the impossible even harder? | |> Of course, it is always possible to insert code that will send the |> unencrypted data, once you've logged on - not easy for the casual user, |> but for the guru, an easy thing. | | That's operating system security and has nothing to do with cryptology. | Someone having only your hard disk can't inject a rootkit into the system. Are you a cryptology expert? By the way, nothing is impossible. The only thing that cryptography attempts to do is reduce the **probability** of cracking the key and gaining access to the data as low as possible. As for brute forcing a passphrase: Since most implementations of AES (Rijndael) use a hash of the passphrase to form the key, it amounts to the same thing, in practice, as cracking the key. Cryptology is, at least partly about finding the weakest link, because that is what is likely to be attacked in any cryptosystem. If the weakest link is system security or a weak passphrase, then that weakness translates to a weakness in anything encrypted in such an environment. The US Government only keeps classified information on non-networked computers in secure environments, so the cipher used does not matter as much as the other security measures taken to ensure that the data does not fall into the wrong hands. A final thought: It is a fact that both the US Navy and the NSA are *very* interested in cryptology and data security. The NSA also does have large networks of supercomputers that, using parallel, distributed or concurrent computing principles can crack keys more quickly than you may think. Regards, Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIYqmqAAoJEIAhA8M9p9DAIo8P/A17VwmkVsscVgfFzpCVDQbw 69WHMmoUvn5GasVRiM2JUi2UeEDpzCuLNxYlQglFWhyvsbplV3aiJmtzVdbEitsK hpf7Jt0wNvzi25Cye/j2DJlkGh7PTGRCkrMkoirgg+JTSFC21TzAnJZSUQH3Zhv8 Inb1C53jl8/RV1KTdPOX2W/hNo1VCPfpFnhxhad8fzj59pM1UwMVktwAQtO1JmOW fQm3/mSbeLyr0L5ZKPlc5shao/QVZ7Zo9xTDU8PFrBCmmt93MODGdbaOY7IsCmsl 6vWfWi1suV1a9ptPpU9ohn7YZtHlEboRMb4/mHCsj46SsI9cOo1KVLpqfiQZxd1t U1niZU8Cb67+cvEDcQ/q1eIGDMza01NR8UxtF66vHB8WrGKpLYs+ckHqJg9+hgF5 nUiY2RHeyNd3lh4vUWCY15Kh9OfK/LlL9IvGZV2Vpc066aa/EfC3AyiSSc+cMMx9 r4GQijL3wfKaDY9OUh6hJZcSZpBNTZezQ1sNZNMOm0TgDLGtJNMv5ltHjtZnxmbC Fus0IRrQVYvXT8ADZW80Ic256RWtUvn73WjBevYswa2T/Oc3o/NWc2sMrxEg8FVs a7nCa4ErSKIWRbMHTuTZLO3l6+XXjXm0sHk0qQ4JfFNkoV4gyMZq36HelAb2GsRu 7NJKaZIXlOCuNiYByLfp =wp+F -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 20:25 ` Chris Walters @ 2008-06-25 21:24 ` Sebastian Wiesner 2008-06-25 21:53 ` Jason Rivard 0 siblings, 1 reply; 31+ messages in thread From: Sebastian Wiesner @ 2008-06-25 21:24 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 3569 bytes --] Chris Walters <cjw2004d@comcast.net> at Wednesday 25 June 2008, 22:25:18 > Are you a cryptology expert? Are you then? > The only thing that cryptography attempts to do is reduce the > **probability** of cracking the key and gaining access to the data as low > as possible. No news. That's, why cryptology defines "security" not as "being impossible to crack", but as "being sufficiently improbable to crack". The only cipher, that can't be "brute-forced", is the OTP, which is considered "perfectly secure". > As for brute forcing a passphrase: Since most implementations of AES > (Rijndael) use a hash of the passphrase to form the key, it amounts to > the same thing, in practice, as cracking the key. First of all, you can perform hard disk encryption _without_ a passphrase. You can store keyfiles on smart cards, usb sticks, etc. In this case, you can generate a _truely random_ key. Using a passphrase is the most insecure approach, but still, with a sufficiently random passphrase, you can gain a level of security, that even the NSA will find difficult to come around. The randomness of a 30-char passphrase does of course by far not match the randomness of a 256-bit key, so there is a real chance, that it can be guessed by brute force. Still it will take much cpu time, which is not endless, even to the NSA. In such a case, the question is, if the data, you ciphered, is really worth the effort of putting a super computer into work for a long time to try any possible passphrase. > Cryptology is, at least partly about finding the weakest link, because > that is what is likely to be attacked in any cryptosystem. Of course, absolutely true. Hard disk encryption is by far not perfect, just look at the cold boot attacks that gained public interest in the last time. But you didn't talk of _cryptosystems_ in your previous posts, you did talk about _algorithms_. Summarizing, the modern ciphers themselves are secure, as there is mostly no way to crack them save a brute-force attack on the key. On the other hand, cryptosystems built around these algorithms can of course contain weaknesses and holes, like weak passphrases, unsecure key storage, etc. > The US Government only keeps classified information on non-networked > computers in secure environments, so the cipher used does not matter as > much as the other security measures taken to ensure that the data does > not fall into the wrong hands. May be. I do not know, which restrictions apply to US classified data, I only know about official statements, the US government made towards the security of AES. > A final thought: It is a fact that both the US Navy and the NSA are > *very* interested in cryptology and data security. The NSA also does > have large networks of supercomputers that, using parallel, distributed > or concurrent computing principles can crack keys more quickly than you > may think. You can use simple mathematics to find out, that even the largest super computers, having one peta flop, needs millions of years to perform an exhaustive search through AES key space. Anyway, you may believe, what you want to believe, I'm just reflecting, what real experts like Bruce Schneier have been telling for years: It's wrong to trust into simple ciphers, but it's equally wrong, to believe, that anything can be broken. my 2 cents -- Freedom is always the freedom of dissenters. (Rosa Luxemburg) [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 21:24 ` Sebastian Wiesner @ 2008-06-25 21:53 ` Jason Rivard 2008-06-25 22:10 ` Sebastian Wiesner 0 siblings, 1 reply; 31+ messages in thread From: Jason Rivard @ 2008-06-25 21:53 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 5075 bytes --] On Wed, Jun 25, 2008 at 9:24 PM, Sebastian Wiesner <basti.wiesner@gmx.net> wrote: > Chris Walters <cjw2004d@comcast.net> at Wednesday 25 June 2008, 22:25:18 > > Are you a cryptology expert? > > Are you then? I doubt that either of you are cryptology experts. I've known a few, and I am a crypto-expert, who has worked for the government of the US. > > > The only thing that cryptography attempts to do is reduce the > > **probability** of cracking the key and gaining access to the data as low > > as possible. > > No news. That's, why cryptology defines "security" not as "being > impossible > to crack", but as "being sufficiently improbable to crack". The only > cipher, that can't be "brute-forced", is the OTP, which is > considered "perfectly secure". There is no such thing as perfectly secure, but a cipher algorithm that would take *all* the computers on Earth a year or more to crack is pretty secure. > > > As for brute forcing a passphrase: Since most implementations of AES > > (Rijndael) use a hash of the passphrase to form the key, it amounts to > > the same thing, in practice, as cracking the key. > > First of all, you can perform hard disk encryption _without_ a passphrase. > You can store keyfiles on smart cards, usb sticks, etc. In this case, you > can generate a _truely random_ key. > > Using a passphrase is the most insecure approach, but still, with a > sufficiently random passphrase, you can gain a level of security, that even > the NSA will find difficult to come around. > > The randomness of a 30-char passphrase does of course by far not match the > randomness of a 256-bit key, so there is a real chance, that it can be > guessed by brute force. Still it will take much cpu time, which is not > endless, even to the NSA. I don't think I can really comment on this, except to say that smart cards and usb thumb drives are the way to go for security. As long as you can keep control of the device. > > In such a case, the question is, if the data, you ciphered, is really worth > the effort of putting a super computer into work for a long time to try any > possible passphrase. Mr. Walters' claim is not that they would put a single super-computer to decrypting it, but a "network of supercomputers". I truly don't think you have to worry about that occurring, unless you are deemed a danger to US National Security. Even then, AES is very hard to crack. The major weakness is the person who encrypts the data. Under questioning, most will give up their keys. > > > Cryptology is, at least partly about finding the weakest link, because > > that is what is likely to be attacked in any cryptosystem. > > Of course, absolutely true. Hard disk encryption is by far not perfect, > just look at the cold boot attacks that gained public interest in the last > time. But you didn't talk of _cryptosystems_ in your previous posts, you > did talk about _algorithms_. By themselves algorithms are relatively useless. It is only the application of those algorithms that make them useful. In this case, Mr. Walters pointed out how *NOT* to apply cipher algorithms. Some of the ways, anyway. > > Summarizing, the modern ciphers themselves are secure, as there is mostly > no > way to crack them save a brute-force attack on the key. On the other hand, > cryptosystems built around these algorithms can of course contain > weaknesses and holes, like weak passphrases, unsecure key storage, etc. > > > The US Government only keeps classified information on non-networked > > computers in secure environments, so the cipher used does not matter as > > much as the other security measures taken to ensure that the data does > > not fall into the wrong hands. > > May be. I do not know, which restrictions apply to US classified data, I > only know about official statements, the US government made towards the > security of AES. I can neither confirm nor deny Mr. Walters' statement. I will state that the United States Government does, in fact, use ciphers to communicate with Embassies, Military Camps and Bases abroad, and Naval vessels. That hardly fits Mr. Walters' statement. > > > A final thought: It is a fact that both the US Navy and the NSA are > > *very* interested in cryptology and data security. The NSA also does > > have large networks of supercomputers that, using parallel, distributed > > or concurrent computing principles can crack keys more quickly than you > > may think. > > You can use simple mathematics to find out, that even the largest super > computers, having one peta flop, needs millions of years to perform an > exhaustive search through AES key space. > > Anyway, you may believe, what you want to believe, I'm just reflecting, > what > real experts like Bruce Schneier have been telling for years: It's wrong > to trust into simple ciphers, but it's equally wrong, to believe, that > anything can be broken. It is equally wrong to believe that any cipher is immune to attack, but it is not nearly as easy as Mr. Walters would have you believe. > > > my 2 cents > My nickel... Jase [-- Attachment #2: Type: text/html, Size: 6872 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] loop-aes + extra-ciphers... 2008-06-25 21:53 ` Jason Rivard @ 2008-06-25 22:10 ` Sebastian Wiesner 2008-06-26 2:22 ` [gentoo-user] My last words on cryptology and cryptography Chris Walters 0 siblings, 1 reply; 31+ messages in thread From: Sebastian Wiesner @ 2008-06-25 22:10 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 3317 bytes --] "Jason Rivard" <jase.rivard@gmail.com> at Wednesday 25 June 2008, 23:53:23 > > > The only thing that cryptography attempts to do is reduce the > > > **probability** of cracking the key and gaining access to the data as > > > low as possible. > > > > No news. That's, why cryptology defines "security" not as "being > > impossible > > to crack", but as "being sufficiently improbable to crack". The only > > cipher, that can't be "brute-forced", is the OTP, which is > > considered "perfectly secure". > > There is no such thing as perfectly secure, A OTP cannot be broken using brute force, so the term "perfectly secure" fits here, imho, at least a bit ;) > > In such a case, the question is, if the data, you ciphered, is really > > worth the effort of putting a super computer into work for a long time > > to try any possible passphrase. > > Mr. Walters' claim is not that they would put a single super-computer to > decrypting it, but a "network of supercomputers". Does that difference really matter for ciphers like AES or at least for brute-force attacks on random 256-bit keys? > I truly don't think you > have to worry about that occurring, unless you are deemed a danger to US > National Security. Even then, AES is very hard to crack. The major > weakness is the person who encrypts the data. Under questioning, most > will give up their keys. > > > > Cryptology is, at least partly about finding the weakest link, > > > because that is what is likely to be attacked in any cryptosystem. > > > > Of course, absolutely true. Hard disk encryption is by far not > > perfect, just look at the cold boot attacks that gained public interest > > in the last time. But you didn't talk of _cryptosystems_ in your > > previous posts, you did talk about _algorithms_. > > By themselves algorithms are relatively useless. It is only the > application of those algorithms that make them useful. Still, there is a difference between the algorithm as such and a cryptosystem applying this algorithm. Btw, apart from general stuff like weak passphrases, that apply to most cryptosystems, really bad leaks often came from weak algorithms. Consider WEP. > > > A final thought: It is a fact that both the US Navy and the NSA are > > > *very* interested in cryptology and data security. The NSA also does > > > have large networks of supercomputers that, using parallel, > > > distributed or concurrent computing principles can crack keys more > > > quickly than you may think. > > > > You can use simple mathematics to find out, that even the largest super > > computers, having one peta flop, needs millions of years to perform an > > exhaustive search through AES key space. > > > > Anyway, you may believe, what you want to believe, I'm just reflecting, > > what > > real experts like Bruce Schneier have been telling for years: It's > > wrong to trust into simple ciphers, but it's equally wrong, to believe, > > that anything can be broken. > > It is equally wrong to believe that any cipher is immune to attack I don't and I did not say so, things like the Debian disaster bring you back to reality from dreams ... -- Freedom is always the freedom of dissenters. (Rosa Luxemburg) [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] My last words on cryptology and cryptography. 2008-06-25 22:10 ` Sebastian Wiesner @ 2008-06-26 2:22 ` Chris Walters 2008-06-26 8:54 ` Alan McKinnon 0 siblings, 1 reply; 31+ messages in thread From: Chris Walters @ 2008-06-26 2:22 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Sebastian Wiesner wrote: | "Jason Rivard" <jase.rivard@gmail.com> at Wednesday 25 June 2008, 23:53:23 [snip] | A OTP cannot be broken using brute force, so the term "perfectly secure" | fits here, imho, at least a bit ;) A OTP cipher would be *theoretically* impossible to crack, even given infinite computing power. I use the word "theoretically" here because this "perfect security" of OTP depends on a purely theoretical perfect setting. http://en.wikipedia.org/wiki/One-time_pad | Does that difference really matter for ciphers like AES or at least for | brute-force attacks on random 256-bit keys? The key word here is "random". Nothing generated by your computer can generate pure entropy, only a good representation of it. Now if you have a computer network at your disposal, and can get the computers working in parallel or in a distributed manner, you will notice that tasks are completed much faster than with one computer working on that task. A network of supercomputers would be able to, in a sense, either work on breaking a single key at a time (assuming CBC with keys >= blocks), then you could decrypt the message one block at a time. I did not say it would be very fast, just faster than many people would like to assume. [snip] | Still, there is a difference between the algorithm as such and a | cryptosystem applying this algorithm. | | Btw, apart from general stuff like weak passphrases, that apply to most | cryptosystems, really bad leaks often came from weak algorithms. Consider | WEP. An algorithm is just a "recipe" - a set of steps to achieve a task. The implementation is the *only* thing that counts. A weak implementation of AES256 would lead to a weak cryptosystem. While a strong implementation would, theoretically, lead to a strong cryptosystem. I will state my view as a programmer. An algorithm is next to useless without a working application that uses it. As an aside, let us say you use a USB thumb drive or the like to store a master key, from which cryptographically random quality keys are derived. There would be two weak points in that system. You, and the thumb drive. If any entity can get you, your computer and your thumb drive, your data could be decrypted without the need for a supercomputer. [snip] |>> Anyway, you may believe, what you want to believe, I'm just reflecting, |>> what |>> real experts like Bruce Schneier have been telling for years: It's |>> wrong to trust into simple ciphers, but it's equally wrong, to believe, |>> that anything can be broken. |> It is equally wrong to believe that any cipher is immune to attack | | I don't and I did not say so, things like the Debian disaster bring you back | to reality from dreams ... With desktop computing power and speed growing at the rate that it currently is, does it stretch the imagination so much that supercomputer power and speed is also growing at a similar rate. Even if an AES256 key cannot be broken "in a million years" by one supercomputer (*I* would like to see a citation for that), there will soon be a time when it will be able to be cracked in a much shorter time - with one supercomputer. Regards, Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIYv1LAAoJEIAhA8M9p9DAK44P/2ikcuihfTj6OgArcNvJUHNK m1qwKpk8dRkkeeLQsNZJzZtd00Gv03dkV0pD3sEfzVlKl9TIaoMheJ4D+XqHuorA ojFfWjcV7eFs5C5rMpvyb96fQ+m98bfRuGNlwnb3Jwy82ehGsxdM3VuVQEgojsyi TmFIuoS9moZrecLn+Smap5SxSvFmSdHpZ/sy0vbN78+58vvP/Fuq+uoqdz5fZcJH HwPu+8euaabBOiiPBXInRYYCfSdDqS/X9VuUzetRIhU15B+yijBesDmeo9BjB3oi ING3XFtbXiQ94/Kjzfz3Bx5MGotm2npM4H8TIr1SQSpB57j8+VHy+EepFWEjN3Dj hh8D3d4hpw64oBi6Gj+P0b/4QYkot1yBdQvXXeAt7oappQ0QsFXv1CDvGS8tDQ9f WWv9IXQ/1EaeQYPLVEv8kSuTxgqte4EcvpUJpIZ9Ku4Z8PGh50Bc2Y2AGlszezxk IIk7eI/Z2wJquQ7+A8QLGpiuM2+2WDfrfdh/kvX4AZS6mYm/a2V95K9oPPGTqDgp R5HwGW69hANARhdJAQg/GZFMrsi3BFGMDtj1EIVnWwXS1W3cAFZFIWJHWuBf0c06 5aQjYQNq055eUe1QvsIf0v3eyuG1QiOazb+0FaDJ1u9wrgsYQ7G1hR9uVBCxyWz7 moYaBh171qt40nMFrp8u =ond2 -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] My last words on cryptology and cryptography. 2008-06-26 2:22 ` [gentoo-user] My last words on cryptology and cryptography Chris Walters @ 2008-06-26 8:54 ` Alan McKinnon 2008-06-26 18:35 ` kashani 2008-06-26 20:14 ` Sebastian Wiesner 0 siblings, 2 replies; 31+ messages in thread From: Alan McKinnon @ 2008-06-26 8:54 UTC (permalink / raw To: gentoo-user On Thursday 26 June 2008, Chris Walters wrote: > Sebastian Wiesner wrote: > | I don't and I did not say so, things like the Debian disaster bring > | you back to reality from dreams ... This is the favoured method of cracking encryption - misuse by the user. The canonical example is of course Enigma and the stupid mistake that let the Allies crack it. This is entirely analogous to the Debian fiasco. > With desktop computing power and speed growing at the rate that it > currently is, does it stretch the imagination so much that > supercomputer power and speed is also growing at a similar rate. > Even if an AES256 key cannot be broken "in a million years" by one > supercomputer (*I* would like to see a citation for that), there will > soon be a time when it will be able to be cracked in a much shorter > time - with one supercomputer. No-one has ever seriously said that it will take X time to crack a key. The possibility exists that the first key randomly selected in a brute force attack will match which gives you a time to crack in the millisecond range. The calculation is quite simple - measure how quickly a specific computer can match keys. Divide this into the size of the keyspace. The average time to brute force a key is half that value. AFAIK this still averages out at enormous numbers of years, even at insane calculation rates like what RoadRunner can achieve. All this presupposes that the algorithm in question has no known cryptographic weaknesses so brute force is the only feasible method of attack currently. -- Alan McKinnon alan dot mckinnon at gmail dot com -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] My last words on cryptology and cryptography. 2008-06-26 8:54 ` Alan McKinnon @ 2008-06-26 18:35 ` kashani 2008-06-26 21:52 ` Steven Lembark 2008-06-26 20:14 ` Sebastian Wiesner 1 sibling, 1 reply; 31+ messages in thread From: kashani @ 2008-06-26 18:35 UTC (permalink / raw To: gentoo-user Alan McKinnon wrote: > The calculation is quite simple - measure how quickly a specific > computer can match keys. Divide this into the size of the keyspace. The > average time to brute force a key is half that value. AFAIK this still > averages out at enormous numbers of years, even at insane calculation > rates like what RoadRunner can achieve. 256 bit keys. The 115792089237316195423570985008687907853269984665640564039457584007913129639936 keys are quite a lot to check (although, if all the atoms in the universe [estimated 10^78] were to test 1 key/sec, it'd only take about 0.1157920892 seconds). However.. 512 bit keys with all the atoms testing a trillion keys/second would take about (2^512)/(10^78)/60/60/24/(36525/100)/(10^12) or 4.2486779507765473608e56 years.. I submit that brute forcing an AES key of reasonably length is currently impossible in an amount of time that would matter to the human race. kashani -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] My last words on cryptology and cryptography. 2008-06-26 18:35 ` kashani @ 2008-06-26 21:52 ` Steven Lembark 2008-06-27 0:06 ` kashani 2008-06-27 13:04 ` Sebastian Wiesner 0 siblings, 2 replies; 31+ messages in thread From: Steven Lembark @ 2008-06-26 21:52 UTC (permalink / raw To: gentoo-user > I submit that brute forcing an AES key of reasonably length is > currently impossible in an amount of time that would matter to the human > race. On average yes. As already pointed out, however, there is nothing to prevent the first guess from matching a key and cracking one particular example of the cipher in 0.0001 seconds. Therefore, brute forcing an AES key of any length is quite possible, even if it is unlikely. q.e.d. -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] My last words on cryptology and cryptography. 2008-06-26 21:52 ` Steven Lembark @ 2008-06-27 0:06 ` kashani 2008-06-27 13:04 ` Sebastian Wiesner 1 sibling, 0 replies; 31+ messages in thread From: kashani @ 2008-06-27 0:06 UTC (permalink / raw To: gentoo-user Steven Lembark wrote: > >> I submit that brute forcing an AES key of reasonably length is >> currently impossible in an amount of time that would matter to the >> human race. > > On average yes. > > As already pointed out, however, there is nothing > to prevent the first guess from matching a key and > cracking one particular example of the cipher in > 0.0001 seconds. > > Therefore, brute forcing an AES key of any length > is quite possible, even if it is unlikely. q.e.d. > This is not interesting data nor particularly relevant. That said, the chances of your key is not randomly guessed are far far better than average. Getting lucky is not the same as being able to evaluate a significant portion of the key space in a short period of time. kashani -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] My last words on cryptology and cryptography. 2008-06-26 21:52 ` Steven Lembark 2008-06-27 0:06 ` kashani @ 2008-06-27 13:04 ` Sebastian Wiesner 1 sibling, 0 replies; 31+ messages in thread From: Sebastian Wiesner @ 2008-06-27 13:04 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 962 bytes --] Steven Lembark <lembark@wrkhors.com> at Thursday 26 June 2008, 23:52:17 > > I submit that brute forcing an AES key of reasonably length is > > currently impossible in an amount of time that would matter to the > > human race. > > On average yes. > > As already pointed out, however, there is nothing > to prevent the first guess from matching a key and > cracking one particular example of the cipher in > 0.0001 seconds. A probability of something like 1 / 50000 to die in a car accident does not one prevent from driving a car. But a probability of 1 / (2^256) of finding the first key right away at the first guess is easily held up against key security of AES ... now that's a very strange mismatch. Apparently you consider the security of your life much, much less worth than security of your encrypted hard disk ... -- Freedom is always the freedom of dissenters. (Rosa Luxemburg) [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] My last words on cryptology and cryptography. 2008-06-26 8:54 ` Alan McKinnon 2008-06-26 18:35 ` kashani @ 2008-06-26 20:14 ` Sebastian Wiesner 2008-06-26 20:39 ` Alan McKinnon 1 sibling, 1 reply; 31+ messages in thread From: Sebastian Wiesner @ 2008-06-26 20:14 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 945 bytes --] Alan McKinnon <alan.mckinnon@gmail.com> at Thursday 26 June 2008, 10:54:43 > The calculation is quite simple - measure how quickly a specific > computer can match keys. Divide this into the size of the keyspace. The > average time to brute force a key is half that value. AFAIK this still > averages out at enormous numbers of years, even at insane calculation > rates like what RoadRunner can achieve. According to Wikipedia RoadRunner is designed for 1.7 petaflops in peak. Assuming for the sake of simplicity, that decryption can be performed within a single flop: (2^256) / (1.7 * 10^15) / 2 ~= 3.5 * 10^61 In years: 3.5 * 10^61 / 3600 / 24 / 356 ~= 10^54 Correct me if I'm wrong, but it seems impossible to me, to reduce this get the required amount somewhere near to the life time of a human being ;) -- Freedom is always the freedom of dissenters. (Rosa Luxemburg) [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] My last words on cryptology and cryptography. 2008-06-26 20:14 ` Sebastian Wiesner @ 2008-06-26 20:39 ` Alan McKinnon 2008-06-26 22:10 ` [gentoo-user] h Volker Armin Hemmann 0 siblings, 1 reply; 31+ messages in thread From: Alan McKinnon @ 2008-06-26 20:39 UTC (permalink / raw To: gentoo-user On Thursday 26 June 2008, Sebastian Wiesner wrote: > Alan McKinnon <alan.mckinnon@gmail.com> at Thursday 26 June 2008, > 10:54:43 > > > The calculation is quite simple - measure how quickly a specific > > computer can match keys. Divide this into the size of the keyspace. > > The average time to brute force a key is half that value. AFAIK > > this still averages out at enormous numbers of years, even at > > insane calculation rates like what RoadRunner can achieve. > > According to Wikipedia RoadRunner is designed for 1.7 petaflops in > peak. Assuming for the sake of simplicity, that decryption can be > performed within a single flop: > > (2^256) / (1.7 * 10^15) / 2 ~= 3.5 * 10^61 > > In years: > > 3.5 * 10^61 / 3600 / 24 / 356 ~= 10^54 > > Correct me if I'm wrong, but it seems impossible to me, to reduce > this get the required amount somewhere near to the life time of a > human being ;) Even with your ultra-liberal assumptions, it still comes out to: 1000000000000000000000000000000000000 times longer than the entire universe is believed to have existed thus far (14 billion years). That is an unbelievable stupendously long period of time. Yeah, I'd agree that brute force is utterly unfeasible as a vector of attack. Not even the almighty NSA could ever pull that one off as there simply aren't enough atoms in the universe to make a supercomputer big enough. Numbers don't lie. -- Alan McKinnon alan dot mckinnon at gmail dot com -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* [gentoo-user] h 2008-06-26 20:39 ` Alan McKinnon @ 2008-06-26 22:10 ` Volker Armin Hemmann 2008-06-26 22:47 ` Sebastian Günther 2008-06-27 8:42 ` Alan McKinnon 0 siblings, 2 replies; 31+ messages in thread From: Volker Armin Hemmann @ 2008-06-26 22:10 UTC (permalink / raw To: gentoo-user On Donnerstag, 26. Juni 2008, Alan McKinnon wrote: > On Thursday 26 June 2008, Sebastian Wiesner wrote: > > Alan McKinnon <alan.mckinnon@gmail.com> at Thursday 26 June 2008, > > 10:54:43 > > > > > The calculation is quite simple - measure how quickly a specific > > > computer can match keys. Divide this into the size of the keyspace. > > > The average time to brute force a key is half that value. AFAIK > > > this still averages out at enormous numbers of years, even at > > > insane calculation rates like what RoadRunner can achieve. > > > > According to Wikipedia RoadRunner is designed for 1.7 petaflops in > > peak. Assuming for the sake of simplicity, that decryption can be > > performed within a single flop: > > > > (2^256) / (1.7 * 10^15) / 2 ~= 3.5 * 10^61 > > > > In years: > > > > 3.5 * 10^61 / 3600 / 24 / 356 ~= 10^54 > > > > Correct me if I'm wrong, but it seems impossible to me, to reduce > > this get the required amount somewhere near to the life time of a > > human being ;) > > Even with your ultra-liberal assumptions, it still comes out to: > > 1000000000000000000000000000000000000 > > times longer than the entire universe is believed to have existed thus > far (14 billion years). That is an unbelievable stupendously long > period of time. Yeah, I'd agree that brute force is utterly unfeasible > as a vector of attack. Not even the almighty NSA could ever pull that > one off as there simply aren't enough atoms in the universe to make a > supercomputer big enough. > > Numbers don't lie. and this is why nobody uses brute force. There a better ways to crack keys. NSA has tons of experts in mathematics and cryptoanalysis. Plus very sophisticated hardware. I am sure for most ciphers they use something much more efficient than stupid brute force. -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-26 22:10 ` [gentoo-user] h Volker Armin Hemmann @ 2008-06-26 22:47 ` Sebastian Günther 2008-06-26 23:37 ` Neil Bothwick ` (2 more replies) 2008-06-27 8:42 ` Alan McKinnon 1 sibling, 3 replies; 31+ messages in thread From: Sebastian Günther @ 2008-06-26 22:47 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 1093 bytes --] * Volker Armin Hemmann (volker.armin.hemmann@tu-clausthal.de) [27.06.08 00:12]: > and this is why nobody uses brute force. > > There a better ways to crack keys. NSA has tons of experts in mathematics and > cryptoanalysis. Plus very sophisticated hardware. I am sure for most ciphers > they use something much more efficient than stupid brute force. > The thing about this keys is, that there is no better way than to brute force such keys. The algorithm uses a function which inverse is a known hard problem which resides in NP, which is a class of functions equal to just guessing. If the NSA had a sufficient algorithm, that is capable of reducing the time that much, they should also be able to prove P=NP. This is worth 1.000.000$ iirc and somehow you should get a Nobel Prize for it. For deeper and better insight, take some courses in cryptography and theoretical computer sience, they are quiet good at Clausthal. Sebastian -- " Religion ist das Opium des Volkes. " Karl Marx SEB@STI@N GÜNTHER mailto:samson@guenther-roetgen.de [-- Attachment #2: Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-26 22:47 ` Sebastian Günther @ 2008-06-26 23:37 ` Neil Bothwick 2008-06-27 9:44 ` Stroller 2008-06-27 0:16 ` Volker Armin Hemmann 2008-06-27 0:28 ` kashani 2 siblings, 1 reply; 31+ messages in thread From: Neil Bothwick @ 2008-06-26 23:37 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 623 bytes --] On Fri, 27 Jun 2008 00:47:34 +0200, Sebastian Günther wrote: > If the NSA had a sufficient algorithm, that is capable of > reducing the time that much, they should also be able to prove P=NP. > This is worth 1.000.000$ iirc and somehow you should get a Nobel Prize > for it. I'm sure the NSA would be happy to forego the prize and keep quiet about being able to break a secure cipher. Just like our GCHQ came up with public key cryptography several years before Rivest, Shamir and Adleman published RSA but kept it secret for over 30 years. -- Neil Bothwick If I save time, when do I get it back? [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-26 23:37 ` Neil Bothwick @ 2008-06-27 9:44 ` Stroller 2008-06-27 10:08 ` Neil Bothwick 0 siblings, 1 reply; 31+ messages in thread From: Stroller @ 2008-06-27 9:44 UTC (permalink / raw To: gentoo-user On 27 Jun 2008, at 00:37, Neil Bothwick wrote: > On Fri, 27 Jun 2008 00:47:34 +0200, Sebastian Günther wrote: > >> If the NSA had a sufficient algorithm, that is capable of >> reducing the time that much, they should also be able to prove P=NP. >> This is worth 1.000.000$ iirc and somehow you should get a Nobel >> Prize >> for it. > > I'm sure the NSA would be happy to forego the prize and keep quiet > about > being able to break a secure cipher. I can't help wondering if - since P=NP is such a big problem - the advantages of having this knowledge in the public domain might override the advantages of mere spying. Stroller. -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-27 9:44 ` Stroller @ 2008-06-27 10:08 ` Neil Bothwick 2008-06-27 13:48 ` Alan McKinnon 2008-06-27 20:26 ` Daniel Iliev 0 siblings, 2 replies; 31+ messages in thread From: Neil Bothwick @ 2008-06-27 10:08 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 647 bytes --] On Fri, 27 Jun 2008 10:44:00 +0100, Stroller wrote: > > I'm sure the NSA would be happy to forego the prize and keep quiet > > about > > being able to break a secure cipher. > > I can't help wondering if - since P=NP is such a big problem - the > advantages of having this knowledge in the public domain might > override the advantages of mere spying. I'm sure the holy grail for the NSA is a cipher that everyone thinks is totally secure but they can break. These agencies aren't interested in the greater good, only furthering their own goals. -- Neil Bothwick Tagline file empty. Please refill the bit bucket. [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-27 10:08 ` Neil Bothwick @ 2008-06-27 13:48 ` Alan McKinnon 2008-06-27 22:00 ` Chris Walters 2008-06-27 20:26 ` Daniel Iliev 1 sibling, 1 reply; 31+ messages in thread From: Alan McKinnon @ 2008-06-27 13:48 UTC (permalink / raw To: gentoo-user On Friday 27 June 2008, Neil Bothwick wrote: > On Fri, 27 Jun 2008 10:44:00 +0100, Stroller wrote: > > > I'm sure the NSA would be happy to forego the prize and keep > > > quiet about > > > being able to break a secure cipher. > > > > I can't help wondering if - since P=NP is such a big problem - the > > advantages of having this knowledge in the public domain might > > override the advantages of mere spying. > > I'm sure the holy grail for the NSA is a cipher that everyone thinks > is totally secure but they can break. These agencies aren't > interested in the greater good, only furthering their own goals. This is the spooks we are talking about so I'm sure Neil is right and they are having wet dreams about this very thing. All I can say is, thank $DEITY for open/free software and open algorithms. -- Alan McKinnon alan dot mckinnon at gmail dot com -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-27 13:48 ` Alan McKinnon @ 2008-06-27 22:00 ` Chris Walters 0 siblings, 0 replies; 31+ messages in thread From: Chris Walters @ 2008-06-27 22:00 UTC (permalink / raw To: gentoo-user -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Alan McKinnon wrote: | On Friday 27 June 2008, Neil Bothwick wrote: |> On Fri, 27 Jun 2008 10:44:00 +0100, Stroller wrote: |>>> I'm sure the NSA would be happy to forego the prize and keep |>>> quiet about |>>> being able to break a secure cipher. |>> I can't help wondering if - since P=NP is such a big problem - the |>> advantages of having this knowledge in the public domain might |>> override the advantages of mere spying. |> I'm sure the holy grail for the NSA is a cipher that everyone thinks |> is totally secure but they can break. These agencies aren't |> interested in the greater good, only furthering their own goals. | | This is the spooks we are talking about so I'm sure Neil is right and | they are having wet dreams about this very thing. | | All I can say is, thank $DEITY for open/free software and open | algorithms. Somehow I doubt that the NSA has a magic bullet to crack AES encryption. If they did, it wouldn't be a part of the FIPS. I'd bet dollars to doughnuts that the US Navy has more cryptologists, etc. than the NSA - just a guess here. It would make perfect sense, though - since they have to use radios and satellites to communicate with their ships at sea, they would be most interested in data security - we wouldn't want our enemies ordering our ships or nuclear missile subs to make attacks that weren't ordered by the President... Chris -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJIZWL8AAoJEIAhA8M9p9DAX68QAJaNlRGoASZmMcscX014NPWB R14tkXaOK/ZEcxT3GbbcUTnH8vy4ipbdelw1yGb9s76Rak1/cCXNk8NSSvGtp9J2 yqio2RTXdVy7Jd0luFDsZx+J6tAiMN5P69VUgT/0vjhAt2FDHRiI+93WHAvgh+si 3qyqjv1dP4yS0RCv1hAEB5Kl37okMAvzYWmYQXBrTD5lBpiPNgYmwMr+TRRme6vs SEKFHwSBv8/zDByN1hCNdJ9af1eUSX77fFkT3Ghh5/UTg5dMe1h1oOhHT42k09+d YKII2f7ENYzpEQ5XvZhZGVrEKIAiXc00+1eNt4GSDZufUuOm3IssOQTuhCT/PUDP jAPIdIRN1jyOT+oZhROIWX1jJBfKPZyHGx7ijXACqCqe+7ByusHPduM5yw+9GpH7 ZfM3Jmv22Xdd8oljOxGHTg0mWBp+yyJC7BNFnKDSbkF7UPrRcS8NdNQjtNP78ec7 V25lBTvl6MyVUIu7T+9U9OYlApPSap+D2nJqfwjJyBJ8MlMos3xbPIJzBfUNjOf+ 3PnP9ApUMp98JwYuOe8FCYbwAp/8Gw5DzT1fDOFgAMkYqqBTduy8Gw4itHGegTIY p/584QRpadwKbsBcCpEBJ7FyKGYqOjG2nmf08lq8vUX4Y60ofbVRSoIU1tXV7CWp NWwS0QnnE5ykHpIG1d0/ =LGqw -----END PGP SIGNATURE----- -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-27 10:08 ` Neil Bothwick 2008-06-27 13:48 ` Alan McKinnon @ 2008-06-27 20:26 ` Daniel Iliev 1 sibling, 0 replies; 31+ messages in thread From: Daniel Iliev @ 2008-06-27 20:26 UTC (permalink / raw To: gentoo-user On Fri, 27 Jun 2008 11:08:04 +0100 Neil Bothwick <neil@digimed.co.uk> wrote: > On Fri, 27 Jun 2008 10:44:00 +0100, Stroller wrote: > > > > I'm sure the NSA would be happy to forego the prize and keep > > > quiet about > > > being able to break a secure cipher. > > > > I can't help wondering if - since P=NP is such a big problem - the > > advantages of having this knowledge in the public domain might > > override the advantages of mere spying. > > I'm sure the holy grail for the NSA is a cipher that everyone thinks > is totally secure but they can break. These agencies aren't > interested in the greater good, only furthering their own goals. > > Sounds like AES fits the description :D -- Best regards, Daniel -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-26 22:47 ` Sebastian Günther 2008-06-26 23:37 ` Neil Bothwick @ 2008-06-27 0:16 ` Volker Armin Hemmann 2008-06-27 0:28 ` kashani 2 siblings, 0 replies; 31+ messages in thread From: Volker Armin Hemmann @ 2008-06-27 0:16 UTC (permalink / raw To: gentoo-user On Freitag, 27. Juni 2008, Sebastian Günther wrote: > * Volker Armin Hemmann (volker.armin.hemmann@tu-clausthal.de) [27.06.08 00:12]: > > and this is why nobody uses brute force. > > > > There a better ways to crack keys. NSA has tons of experts in mathematics > > and cryptoanalysis. Plus very sophisticated hardware. I am sure for most > > ciphers they use something much more efficient than stupid brute force. > > The thing about this keys is, that there is no better way than to brute > force such keys. The algorithm uses a function which inverse is a known > hard problem which resides in NP, which is a class of functions equal to > just guessing. If the NSA had a sufficient algorithm, that is capable of > reducing the time that much, they should also be able to prove P=NP. > This is worth 1.000.000$ iirc and somehow you should get a Nobel Prize > for it. I now that AES is pretty good - but there are more ciphers out there - and a lot of them are fishy at best. Some of them nobody really knows, because they are closed and some are known weak. There are good ones and there are bad ones - and I don't doubt that the NSA is pretty good at analyzing the not-so-good- ones. -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-26 22:47 ` Sebastian Günther 2008-06-26 23:37 ` Neil Bothwick 2008-06-27 0:16 ` Volker Armin Hemmann @ 2008-06-27 0:28 ` kashani 2008-06-27 8:51 ` Alan McKinnon 2008-06-27 13:21 ` Sebastian Wiesner 2 siblings, 2 replies; 31+ messages in thread From: kashani @ 2008-06-27 0:28 UTC (permalink / raw To: gentoo-user Sebastian Günther wrote: > * Volker Armin Hemmann (volker.armin.hemmann@tu-clausthal.de) [27.06.08 00:12]: >> and this is why nobody uses brute force. >> >> There a better ways to crack keys. NSA has tons of experts in mathematics and >> cryptanalysis. Plus very sophisticated hardware. I am sure for most ciphers >> they use something much more efficient than stupid brute force. >> > > The thing about this keys is, that there is no better way than to brute > force such keys. The algorithm uses a function which inverse is a known > hard problem which resides in NP, which is a class of functions equal to > just guessing. I don't believe this is true. The algorithm uses a function which is *assumed* to be a hard problem. You assume the problem is hard because you and anyone you know have not been able to make it easy. That does not mean that someone has not discovered some math that does make it easy. Here's a reference to the interesting meet-in-the-middle attack which reduced 3DES key space down to 112 bits from 192. Obviously that was unknown when 3DES was built. http://en.wikipedia.org/wiki/Triple_DES#Security kashani -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-27 0:28 ` kashani @ 2008-06-27 8:51 ` Alan McKinnon 2008-06-27 8:59 ` Neil Bothwick 2008-06-27 13:21 ` Sebastian Wiesner 1 sibling, 1 reply; 31+ messages in thread From: Alan McKinnon @ 2008-06-27 8:51 UTC (permalink / raw To: gentoo-user On Friday 27 June 2008, kashani wrote: > > The thing about this keys is, that there is no better way than to > > brute force such keys. The algorithm uses a function which inverse > > is a known hard problem which resides in NP, which is a class of > > functions equal to just guessing. > > I don't believe this is true. The algorithm uses a function which is > *assumed* to be a hard problem. You assume the problem is hard > because you and anyone you know have not been able to make it easy. > That does not mean that someone has not discovered some math that > does make it easy. It's more than a thumb-suck assumption. In maths, "assume" is overloaded to have an entirely different meaning to what it has in everyday life, much like "theory" in science. The assumption comes from all the solid maths surrounding the NP problem. As any decent mathematician/cryptologist will tell you, cracking this one is the current holy grail in their field and the amount of man-power being applied to solving it is staggering. Neil mentioned GCHQ developing public key several years before RSA, but do note that RSA still had the same bright idea that GCHQ had, only a few short years later. There are thousands of examples in math and science of the same huge advances being made by two parties independently - because they are working from the same known base. I feel quite confident that the NP problem will be no different. -- Alan McKinnon alan dot mckinnon at gmail dot com -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-27 8:51 ` Alan McKinnon @ 2008-06-27 8:59 ` Neil Bothwick 0 siblings, 0 replies; 31+ messages in thread From: Neil Bothwick @ 2008-06-27 8:59 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 614 bytes --] On Fri, 27 Jun 2008 10:51:57 +0200, Alan McKinnon wrote: > Neil > mentioned GCHQ developing public key several years before RSA, but do > note that RSA still had the same bright idea that GCHQ had, only a few > short years later. The important point was that they kept quiet about it. Even after RSA entered the public domain, they let everyone think it was news to them. Mind you, the UK government kept quiet about breaking Enigma after WWII was over, so they could sell these "secure" systems to their Commonwealth "friends". -- Neil Bothwick Top Oxymorons Number 2: Exact estimate [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-27 0:28 ` kashani 2008-06-27 8:51 ` Alan McKinnon @ 2008-06-27 13:21 ` Sebastian Wiesner 1 sibling, 0 replies; 31+ messages in thread From: Sebastian Wiesner @ 2008-06-27 13:21 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 1285 bytes --] kashani <kashani-list@badapple.net> at Friday 27 June 2008, 02:28:21 > Here's a reference to the interesting meet-in-the-middle attack which > reduced 3DES key space down to 112 bits from 192. 3DES always had an effective key size of 112 bits, because it uses the original DES algorithm applied in the following scheme E1(D2(E1(M)) with two different 56-bit DES keys. 3DES never had 192 bit keys. The meet-in-the-middle attack has nothing to do with 3DES. In fact, 3DES was designed the way it works now to _prevent_ meet-in-the-middle attacks. Such attacks can be applied to ciphers, that apply a single algorithm with two different keys: E1(E2(M)) Mathematical, the key size of the latter cipher is equal to 3DES: 56+56 = 112. But the latter cipher is vulnerable to meet-in-the-middle attacks, which is why 3DES uses the second key to apply the DES decryption function with a different key right between the consecutive DES encryptions. > Obviously that was unknown when 3DES was built. I doubt. If meet in the middle was unknown at the time of 3DES development, we wouldn't have 3DES today, but 2DES, being as simple as E1(E2(M)). -- Freedom is always the freedom of dissenters. (Rosa Luxemburg) [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 197 bytes --] ^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [gentoo-user] h 2008-06-26 22:10 ` [gentoo-user] h Volker Armin Hemmann 2008-06-26 22:47 ` Sebastian Günther @ 2008-06-27 8:42 ` Alan McKinnon 1 sibling, 0 replies; 31+ messages in thread From: Alan McKinnon @ 2008-06-27 8:42 UTC (permalink / raw To: gentoo-user On Friday 27 June 2008, Volker Armin Hemmann wrote: > > Numbers don't lie. > > and this is why nobody uses brute force. > > There a better ways to crack keys. NSA has tons of experts in > mathematics and cryptoanalysis. Plus very sophisticated hardware. I > am sure for most ciphers they use something much more efficient than > stupid brute force. Like what for example? Decent algorithms tend to have no known published weaknesses and their output is randomly distributed. Which brings us back to relying on stupid user input errors (Debian, anyone?) If anyone does know of weaknesses in the good algorithms, they are certainly not telling. I doubt anyone could ever keep that genie in a bottle for very long as it would be the mathematical coup of the millenium. So the reasonable real-world view of this to me is that not even the almighty NSA can crack it yet. I'm betting they still use good old-fashioned tried-and-proven social engineering and hosepipe techniques for their successes. -- Alan McKinnon alan dot mckinnon at gmail dot com -- gentoo-user@lists.gentoo.org mailing list ^ permalink raw reply [flat|nested] 31+ messages in thread
end of thread, other threads:[~2008-06-27 22:02 UTC | newest] Thread overview: 31+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2008-06-25 2:20 [gentoo-user] loop-aes + extra-ciphers Chris Walters 2008-06-25 5:43 ` Dirk Heinrichs 2008-06-25 13:20 ` Daniel Iliev 2008-06-25 15:14 ` Chris Walters 2008-06-25 18:51 ` Sebastian Wiesner 2008-06-25 20:25 ` Chris Walters 2008-06-25 21:24 ` Sebastian Wiesner 2008-06-25 21:53 ` Jason Rivard 2008-06-25 22:10 ` Sebastian Wiesner 2008-06-26 2:22 ` [gentoo-user] My last words on cryptology and cryptography Chris Walters 2008-06-26 8:54 ` Alan McKinnon 2008-06-26 18:35 ` kashani 2008-06-26 21:52 ` Steven Lembark 2008-06-27 0:06 ` kashani 2008-06-27 13:04 ` Sebastian Wiesner 2008-06-26 20:14 ` Sebastian Wiesner 2008-06-26 20:39 ` Alan McKinnon 2008-06-26 22:10 ` [gentoo-user] h Volker Armin Hemmann 2008-06-26 22:47 ` Sebastian Günther 2008-06-26 23:37 ` Neil Bothwick 2008-06-27 9:44 ` Stroller 2008-06-27 10:08 ` Neil Bothwick 2008-06-27 13:48 ` Alan McKinnon 2008-06-27 22:00 ` Chris Walters 2008-06-27 20:26 ` Daniel Iliev 2008-06-27 0:16 ` Volker Armin Hemmann 2008-06-27 0:28 ` kashani 2008-06-27 8:51 ` Alan McKinnon 2008-06-27 8:59 ` Neil Bothwick 2008-06-27 13:21 ` Sebastian Wiesner 2008-06-27 8:42 ` Alan McKinnon
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox