From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([69.77.167.62] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1KC9WG-0000nA-Ag for garchives@archives.gentoo.org; Fri, 27 Jun 2008 08:41:24 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 37572E03D6; Fri, 27 Jun 2008 08:41:22 +0000 (UTC) Received: from yw-out-1718.google.com (yw-out-1718.google.com [74.125.46.152]) by pigeon.gentoo.org (Postfix) with ESMTP id 179F5E03D6 for ; Fri, 27 Jun 2008 08:41:22 +0000 (UTC) Received: by yw-out-1718.google.com with SMTP id 5so172975ywm.46 for ; Fri, 27 Jun 2008 01:41:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:from:to:subject:date :user-agent:references:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:message-id; bh=C0V/mjMX7eQlRnsdFNcgOWLuRG4LvA3hGCWgmfltqGg=; b=odToLolkpZCdYw8MLNwOOdV+X8BjRyQb8k2sGKTgbfF5fZcaJmEyw+7WIGOkslUWqE Rudkr82FPXKF92VR/oT8JrNsvVL9N8tDZx+vWlj1OSCKIW64drtfxy00CNjUr+yiEm7J nR153N1aDiHD2X/zFNgsrKa/dGpVaQ2uiTp00= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=from:to:subject:date:user-agent:references:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :message-id; b=EDigCQo6nHSNiSXmpjUbNKfUPYhtv2zlpT3KOS2cR2afwSbCE8u5nRLbcFAqTZKODy kj54Is7KJ5yp1ArkMHOTLlgZgjjaYuxl13lHjpWGVIbXmgqmDCyC8t1HBYADic8x9JlY 3/6R56pThYu7NajTRziXK2zbd/pctNKYOiPFs= Received: by 10.151.98.16 with SMTP id a16mr1787624ybm.202.1214556081744; Fri, 27 Jun 2008 01:41:21 -0700 (PDT) Received: from ?10.0.0.3? ( [41.243.240.172]) by mx.google.com with ESMTPS id 9sm1776583qbw.14.2008.06.27.01.41.19 (version=SSLv3 cipher=RC4-MD5); Fri, 27 Jun 2008 01:41:21 -0700 (PDT) From: Alan McKinnon To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] h Date: Fri, 27 Jun 2008 10:42:03 +0200 User-Agent: KMail/1.9.9 References: <4861AB64.9000709@comcast.net> <200806262239.42820.alan.mckinnon@gmail.com> <200806270010.20819.volker.armin.hemmann@tu-clausthal.de> In-Reply-To: <200806270010.20819.volker.armin.hemmann@tu-clausthal.de> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200806271042.03492.alan.mckinnon@gmail.com> X-Archives-Salt: 3cda89bd-8f8e-4cab-857c-ac40cfc01171 X-Archives-Hash: d348ee984657d9760e8c33df431504af On Friday 27 June 2008, Volker Armin Hemmann wrote: > > Numbers don't lie. > > and this is why nobody uses brute force. > > There a better ways to crack keys. NSA has tons of experts in > mathematics and cryptoanalysis. Plus very sophisticated hardware. I > am sure for most ciphers they use something much more efficient than > stupid brute force. Like what for example? Decent algorithms tend to have no known published weaknesses and their output is randomly distributed. Which brings us back to relying on stupid user input errors (Debian, anyone?) If anyone does know of weaknesses in the good algorithms, they are certainly not telling. I doubt anyone could ever keep that genie in a bottle for very long as it would be the mathematical coup of the millenium. So the reasonable real-world view of this to me is that not even the almighty NSA can crack it yet. I'm betting they still use good old-fashioned tried-and-proven social engineering and hosepipe techniques for their successes. -- Alan McKinnon alan dot mckinnon at gmail dot com -- gentoo-user@lists.gentoo.org mailing list