General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsAbout encryption as a privacy protection from the NSA
I worked for them 45years ago. Even back then they broke electronic encryption in dam near real time. Knowing at least something of their capability half a century ago I find all this talk what they can't do dam near laughable. If someone were to tell me that now days they can read minds I would not doubt it for a second.
Warren Stupidity
(48,181 posts)A long time ago.
wandy
(3,539 posts)I remember when DES 64 was considered unbreakable.
http://en.wikipedia.org/wiki/Data_Encryption_Standard
So much for that.
As to later versions of DES.
An interesting read.
http://www.sans.org/reading_room/whitepapers/vpns/day-des-died_722
Are their other forms of Encryption?
Yes.
Can they be cracked?
bobduca
(1,763 posts)256 bits is a whole lot more key space than 56 bits.... thus the longer time to find the needle in the much larger haystack.
All hacks /hackers know this so they exploit humans and human processes to gain physical access to computer hard drives
where the private keys are located.
http://www.eetimes.com/design/embedded-internet-design/4372428/How-secure-is-AES-against-brute-force-attacks-
wandy
(3,539 posts)Still, their is the matter of how much comput power you want to throw at it.
I suspect the NSA can bring something a bit more sever than an AMD 8150 to bare.
But you are right. Humans are cheaper!
...and everyone who isn't a goober with a dust-choked desktop computer and an Xbox is in the pocket of the US gubbmit.
Academia and independent science doesn't exist. International rivalry doesn't exist. The US gubbmit is this collection of Supermen who oversee everyone else and the latter are relegated to web browsing and video games.
This attitude comes straight from the swamp that produced the moon landing "hoax" and chemtrail theories. Its what happens when people watch too much Hollywood garbage instead of taking an interest in math and science.
longship
(40,416 posts)Public key cryptology is based on particular problems in number theory, discrete mathematics, the mathematics of whole numbers.
Certain problems in number theory can be constructed such as they can be easily solved only in one direction and extremely difficult to do so in reverse. In the vernacular of cryptology, they're called trap door algorithms. Once you fall through, it's very difficult to get back up.
Now, here's the deal with the insecurity of the 64-bit key DES crypto. It is insecure, that's true. But the context of this test that showed its security was the government attempts to make it a standard. It was broken to show that.
But here's the other deal with these algorithms. They are based on problems whose solution can only approached by exhaustive search. If the search space isn't large enough one can make them secure enough simply by making the search space larger. A 64 bit search space is too small? Fine! Make it a 128 bit search space, which is not double the size, but 65,536 times larger. And a 256 bit one is hugely more greater.
For any level of technology, one can construct crypto based on simple number theory which will make a trap door complex enough that it would take centuries to solve by existent tech.
There are no back doors. And the software is available for free, off the shelf... And in source code so one can be sure of its security.
Knowing the algorithm doesn't help solve the inverse function because there is no analytical solution to the inverse function other than an exhaustive search. And by selecting a long enough key size, one can make that arbitrarily beyond reach.
Too bad, NSA.
Math rules!
cprise
(8,445 posts)You seem to have missed it.
Ways around crypto exist, esp. if the user is sloppy. But the best examples of today's crypto themselves remain very secure.