Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

1-Old-Man

(2,667 posts)
Mon Jun 17, 2013, 08:07 PM Jun 2013

About encryption as a privacy protection from the NSA

I worked for them 45years ago. Even back then they broke electronic encryption in dam near real time. Knowing at least something of their capability half a century ago I find all this talk what they can't do dam near laughable. If someone were to tell me that now days they can read minds I would not doubt it for a second.

7 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
About encryption as a privacy protection from the NSA (Original Post) 1-Old-Man Jun 2013 OP
The NSA abruptly stopped fighting the deployment of public key encryption Warren Stupidity Jun 2013 #1
Encryption is meant to be broken.......... wandy Jun 2013 #2
256 AES is effectively secure against brute force, & when its cracked, we move to 512, 1024 etc. bobduca Jun 2013 #3
Yes and each key is sepreat. That makes it hard................ wandy Jun 2013 #5
Yes cprise Jun 2013 #7
The argument from personal credulity. longship Jun 2013 #4
There was a revolution in crypto cprise Jun 2013 #6

wandy

(3,539 posts)
2. Encryption is meant to be broken..........
Mon Jun 17, 2013, 08:34 PM
Jun 2013

I remember when DES 64 was considered unbreakable.

DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; in January, 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes

http://en.wikipedia.org/wiki/Data_Encryption_Standard

So much for that.
As to later versions of DES.
An interesting read.
http://www.sans.org/reading_room/whitepapers/vpns/day-des-died_722

Are their other forms of Encryption?
Yes.
Can they be cracked?

bobduca

(1,763 posts)
3. 256 AES is effectively secure against brute force, & when its cracked, we move to 512, 1024 etc.
Mon Jun 17, 2013, 08:49 PM
Jun 2013

256 bits is a whole lot more key space than 56 bits.... thus the longer time to find the needle in the much larger haystack.

All hacks /hackers know this so they exploit humans and human processes to gain physical access to computer hard drives
where the private keys are located.

http://www.eetimes.com/design/embedded-internet-design/4372428/How-secure-is-AES-against-brute-force-attacks-

wandy

(3,539 posts)
5. Yes and each key is sepreat. That makes it hard................
Mon Jun 17, 2013, 09:01 PM
Jun 2013

Still, their is the matter of how much comput power you want to throw at it.
I suspect the NSA can bring something a bit more sever than an AMD 8150 to bare.

But you are right. Humans are cheaper!

cprise

(8,445 posts)
7. Yes
Tue Jun 18, 2013, 12:25 AM
Jun 2013

...and everyone who isn't a goober with a dust-choked desktop computer and an Xbox is in the pocket of the US gubbmit.

Academia and independent science doesn't exist. International rivalry doesn't exist. The US gubbmit is this collection of Supermen who oversee everyone else and the latter are relegated to web browsing and video games.

This attitude comes straight from the swamp that produced the moon landing "hoax" and chemtrail theories. Its what happens when people watch too much Hollywood garbage instead of taking an interest in math and science.

longship

(40,416 posts)
4. The argument from personal credulity.
Mon Jun 17, 2013, 09:00 PM
Jun 2013

Public key cryptology is based on particular problems in number theory, discrete mathematics, the mathematics of whole numbers.

Certain problems in number theory can be constructed such as they can be easily solved only in one direction and extremely difficult to do so in reverse. In the vernacular of cryptology, they're called trap door algorithms. Once you fall through, it's very difficult to get back up.

Now, here's the deal with the insecurity of the 64-bit key DES crypto. It is insecure, that's true. But the context of this test that showed its security was the government attempts to make it a standard. It was broken to show that.

But here's the other deal with these algorithms. They are based on problems whose solution can only approached by exhaustive search. If the search space isn't large enough one can make them secure enough simply by making the search space larger. A 64 bit search space is too small? Fine! Make it a 128 bit search space, which is not double the size, but 65,536 times larger. And a 256 bit one is hugely more greater.

For any level of technology, one can construct crypto based on simple number theory which will make a trap door complex enough that it would take centuries to solve by existent tech.

There are no back doors. And the software is available for free, off the shelf... And in source code so one can be sure of its security.

Knowing the algorithm doesn't help solve the inverse function because there is no analytical solution to the inverse function other than an exhaustive search. And by selecting a long enough key size, one can make that arbitrarily beyond reach.

Too bad, NSA.

Math rules!

cprise

(8,445 posts)
6. There was a revolution in crypto
Tue Jun 18, 2013, 12:11 AM
Jun 2013

You seem to have missed it.

Ways around crypto exist, esp. if the user is sloppy. But the best examples of today's crypto themselves remain very secure.

Latest Discussions»General Discussion»About encryption as a pri...