NSA Still Ahead In Crypto, But Not By Much 208
Hugh Pickens writes "Network World summarizes an RSA Conference panel discussion in which former NSA technical director Brian Snow said that cryptographers for the NSA have been losing ground to their counterparts in universities and commercial security vendors for 20 years, but still maintain the upper hand in the sophistication of their crypto schemes and in their ability to decrypt. 'I do believe NSA is still ahead, but not by much — a handful of years,' says Snow. 'I think we've got the edge still.' Snow added that that in the 1980s there was a huge gap between what the NSA could do and what commercial encryption technology was capable of. 'Now we are very close together and moving very slowly forward in a mature field.' The NSA has one key advantage (besides their deep staff of Ph.D. mathematicians and other cryptographic experts who work on securing traffic and breaking codes): 'We cheat. We get to read what [academics] publish. We do not publish what we research,' he said. Snow's claim of NSA superiority seemed to rankle some members on the panel. Adi Shamir, the "S" in the RSA encryption algorithm, said that when the titles of papers in NSA technical journals were declassified up to 1983, none of them included public key encryption; 'That demonstrates that NSA was behind,' said Shamir. Snow replied that when technologies are developed separately in parallel, the developers don't necessarily use the same terms for them."
they aren't very well going to admit defeat. (Score:4, Interesting)
Re: (Score:2, Insightful)
We do not publish what we research
And they also do not publish what they don't research.
Or if and when they suffer or do not suffer defeat.
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
Re:they aren't very well going to admit defeat. (Score:5, Insightful)
It occurs to me to think that real encryption is not beatable, but workable encryption is. The problem is not who has the best or admits to not having it, it's who has best real encryption that is workable between arbitrary peers. I can easily encrypt a drive that you will NEVER decrypt, but then neither will I be able to. It's the secrecy of the key that is the quest, not the encryption particularly. Hiding the key when it is shared publicly is a problem, will always be a problem, and the race is not necessarily one brain trust against another for the best hiding technique, but rather a race to figure out the best way to hide it for a reasonable amount of time from the most people. The fastest car on the planet is not declared the Indy500 winner, only the car that conforms to the rules of the race is. This race is not winable in the long term, and only valid as a race in the very short term. Don't count on your encrypted hard drive to protect your data from everyone, for all time. That's simply not going to happen.
Re: (Score:2)
I don't think hiding the key has been a problem. Public-key cryptography already enables the other key to be publicly known and it doesn't reveal the private key required to encrypt in that. Also if you're using password based key, then obviously you cannot make it public. In the end all of the cryptos are breakable by brute-forcing, it's just about making that part harder. Currently "breaking" the encryption techniques have been mostly about trying to lower the amount of brute-forcing you need to do. The r
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
And with SELinux and NSA contributions to the Linux kernel your world domination plans aren't safe there either. They're everywhere, man.
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
You don't think someone, given enough time, would be able to brute-force your password? The use of Never in zeppepcs post would imply he means literally NEVER. Not "in a reasonable amount of time" or "within a timeframe that the information stored is still valuable" but NEVER IN ALL TIME!!!
Re:they aren't very well going to admit defeat. (Score:5, Informative)
Yes, really and truly, never in all time.
A 256 bit key has 2^256 possibilities. That's 1.15x10^77 possibilities. If you can try 10 million keys in a second, then you "only" need 1.15x10^70th seconds. If you can multiply that speed by a factor of a thousand, then you "only" need 1.15x10^67th seconds. That's 3.67x10^59th years. The universe is only 1.3x10^10 years old.
So never is more than fair. You would literally have to generate universes to generate universes to decrypt via brute force. By our current understanding of reality, impossible is correct, and anything shy of that is literally science ficition.
Re: (Score:2)
Wait, I'm assuming we're talking a 256 character long password. Because I'd sure love to see someone memorise a string of 1 and 0 that is 256 digits long.
Re: (Score:2)
Somes love to memorise thousands of digits of PI. Why it could not be conceivable to memorise only 256 bits or 64 Hex digits or 50 [A-Z0-9] chars or 43 [A-Za-z0-9] chars... I know i could not memorise something like that, but some people can.
Re: (Score:3, Informative)
> I'm assuming we're talking a 256 character long password.
> Because I'd sure love to see someone memorise a string of 1 and 0 that is 256 digits long.
1 Character != 1 Bit of entropy.
But anyway...with a diceware-like approach (http://www.diceware.com) you'll get approximately 12.92 bits of entropy per randomly chosen word. So you'd need only 20 words from the diceware list for your passphrase to actually match and surpass the 256-bit security of the underlying crypto algorithm. 20 words are not that h
Re: (Score:2)
Just pick an easy-to-remember line from a book you like. Add extra punctuation and mix up the characters a bit to make things interesting.
Re: (Score:2)
Because I'd sure love to see someone memorise a string of 1 and 0 that is 256 digits long.
You don't memorise ones and zeros, you pack them into characters.
The life that I have is all that I have
And the life that I have is yours
The love that I have of the life that I have
Is yours and yours and yours.
A sleep I shall have, a rest I shall have
Yet death will be but a pause
For the peace of my years in the long green grass
Will be yours and yours and yours.
306 characters: far far more than is needed.
The author of the poem was a truly remarkable man who led an amazing life.
Re: (Score:2, Funny)
Probably time for you to change your password now ;-)
Re: (Score:2)
Wait, I'm assuming we're talking a 256 character long password. Because I'd sure love to see someone memorise a string of 1 and 0 that is 256 digits long.
Three hours later and no one noticed his post was 155 characters long (at least wc -l claims that). You can look at that as about 8 bits per byte of raw very non random data, giving 1240 bits of nonrandom data and he only needs 256 bits. Pessimistically you might pull 2 bits of randomness out per byte, yielding a whopping 310 bits of randomness. Anyway, thats more than enough to feed a hash function to get a nice even 256 bits. I pushed his post thru sha256sum and got the following 256 bit hash:
d254ed37
Re: (Score:3, Funny)
Can he memorize his post, including his misspelled "memorize" word?
You insensitive clod, he's BRITISH! He can't help it... not even their teachers know how to spell. The most a very bright and motivated student can hope for is ox training classes in Cambridge. Just leave him alone!
Re: (Score:2, Funny)
Why would I memorize it when I can put it on one big sticky note?
Re: (Score:2)
Those 256 bit keys are 256/8 bytes just FYI. Also,in typical usage they're randomly generated keys which are themselves encrypted by public key encryption.
Re: (Score:3, Insightful)
Isn't that what quantum computing does?
Re: (Score:2, Interesting)
You are assuming that whoever wants to break the encryption is doing a brute force attack.
The classical [wikipedia.org]
encryption breaking methods are mainly based on frequency and statistics. I am sure nowadays the NSA and other entities in charge of breaking encrypted content have more sophisticated methods.
Re: (Score:2)
Yes, really and truly, never in all time.
A 256 bit key has 2^256 possibilities. That's 1.15x10^77 possibilities. If you can try 10 million keys in a second, then you "only" need 1.15x10^70th seconds. If you can multiply that speed by a factor of a thousand, then you "only" need 1.15x10^67th seconds. That's 3.67x10^59th years. The universe is only 1.3x10^10 years old.
So never is more than fair. You would literally have to generate universes to generate universes to decrypt via brute force. By our current understanding of reality, impossible is correct, and anything shy of that is literally science ficition.
Uh, no. You are assuming that things will always work the way that they do. By that I mean, presumably, you think 10 million keys is a lot of keys, but what if we could test 2^256 keys per second? Then it's easily decrypted. Obviously given the way we currently do things that's not possible but we may be able to do it with quantum computing (or maybe not). Finally, if you are so keen on constraining things according to the real world, then it's unlikely we'd need to resort to brute-force. All encrypti
Re: (Score:2)
So, what's your point exactly?
Re:they aren't very well going to admit defeat. (Score:5, Interesting)
Are you aware that randomly generating a specific protein is much more difficult than that? I've heard a number around 1 in 10^113. That would be just ONE of the proteins we need for life.
So. Either it needs to be rethought what is actually numerically possible, or that the genetic make-up of life was guided by chance.
Re: (Score:2)
Are you aware that randomly generating a specific protein is much more difficult than that?
I've highlighted the key word: randomly. Specific proteins were not actually generated randomly, but were directed to viable structures via selection.
If there was a way to direct the key search to one of the potential keys that could decrypt the ciphertext into some meaningful plaintext, i.e. selection, then one could break the encryption in a more feasible time frame.
Re: (Score:2)
There's probably natural selection at play here too. The useful proteins continue to replicate, while the useless or harmful ones die out.
Or perhaps one can say, all proteins are useful until they become unuseful.
Re:they aren't very well going to admit defeat. (Score:4, Insightful)
But that is randomly generating a specific protein without working from an earlier protein. Asimov called that the hemoglobin number and used it as an example of why evolution could not work using blind chance. Hemoglobin is just part of a family of proteins called globins and the actual differences among them are relatively small. The evolution of hemoglobin did not happen by chance all in one step but by accumulating change via many much smaller steps from an existing protein.
Strong cryptographic algorithms are specifically designed to be resistant to the type of analysis which would allow you to derive parts of the key until you have the whole thing. Either you have it all, or you have nothing. Evolution of proteins does not work that way.
Re: (Score:2, Insightful)
Re: (Score:2)
Ha! Can you imagine!
"Boss, we decrypted the message! They key was 0x0000...01!"
Re: (Score:2)
Re: (Score:2)
Wrong. You only are likely to need that time. A random key in that keyspace, however, might be the fifth one you try, or the five millionth one, or might be the very last one you try.
Re: (Score:3, Insightful)
You don't think someone, given enough time, would be able to brute-force your password? The use of Never in zeppepcs post would imply he means literally NEVER. Not "in a reasonable amount of time" or "within a timeframe that the information stored is still valuable" but NEVER IN ALL TIME!!!
No, and there's good physical arguments to "NEVER IN ALL TIME!!!" despiate your attempts at hyperbole. Currently the best theories we got suggests there's a lower entropy limit of kT*ln 2 (the Von Neumann-Landauer limit) per operation, which is on the order of 10^-23 joule. The energy of the sun via E=mc^2 is on the order of 10^47 joule. So at most you can do is 10^70 operations but 2^256 = ~10^77. In other words you can't get through the keyspace before you run out of energy, even taking ideal assumptions.
Re:they aren't very well going to admit defeat. (Score:4, Interesting)
Currently the best theories we got suggests there's a lower entropy limit of kT*ln 2 (the Von Neumann-Landauer limit) per operation, which is on the order of 10^-23 joule. The energy of the sun via E=mc^2 is on the order of 10^47 joule. So at most you can do is 10^70 operations but 2^256 = ~10^77. In other words you can't get through the keyspace before you run out of energy, even taking ideal assumptions.
Well, if your strategy is guess and check, sure, OK. Wouldn't this plan be a hell of a lot cheaper:
Estimate the total number of operations a genius level human brain can accomplish per second. I will be wildly optimistic and give it 10^3. Lets assume all thought is directed toward crypto and no daydreaming about the young lady working in accounting, or arguing about which was better, Kirk or Picard.
Estimate the age of the NSA. Wikipedia claims formed in 1952 but theres plenty of cloak and dagger stuff going on before, so we'll round it to 10^3 years
Estimate the total number of geniuses the NSA has hired over the years. The holy font of all wisdom, wikipedia, claims the number of employees is classified. However, they claim there's 18000 parking spaces at HQ. What the hell they do with 18K people is a mystery to me. My guess is theres 17990 supervisors, managers, directors, HR personnel, diversity directors, marketing personnel, and other executives and about 10 guys with pocket protectors doing all the work, in between their slashdot breaks. But lets say on a very long term average they have 10^5 geniuses working at any given instant.
Lets further assume they never eat, sleep, have sex (duh, they're math majors). That gives us 31 million seconds per year. Well, we'll round that down for time to watch star trek reruns, eat pizza rolls, and read slashdot, so call it 10^7 seconds per year.
So, you need to do about 10^3 * 10^3 * 10*5 * 10^7 = about 10^18 crypto related thought operations over the total lifetime of the NSA.
In conclusion, you need to run WELL under 10^18 thought operations to figure out the back door they put into your encryption algorithm and/or reverse engineer their top secret decryption technology. A wee bit less than your 10^70 operations required to brute force one message. Plus, when you crack the entire algorithm, you've cracked all messages ever sent with it, not just one message.
Re: (Score:2)
Well, if your strategy is guess and check, sure,
Well, the post I was replying to said brute force and that's pretty much the definition of brute force.
In conclusion, you need to run WELL under 10^18 thought operations to figure out the back door they put into your encryption algorithm and/or reverse engineer their top secret decryption technology. A wee bit less than your 10^70 operations required to brute force one message. Plus, when you crack the entire algorithm, you've cracked all messages ever sent with it, not just one message.
Uh, wtf kind of logic is that? Since the 1960s millions of people have thought of a "warp drive", that doesn't make it possible. For example, take the RSA algorithm. It depends on p*q = n being trivial to do just like you learned in elementary school, while factoring n to p*q is something mathematicians have spent 2200 years on and not found a really good way of doing. Symmetric encryption is probably even
Re: (Score:2)
Re: (Score:2)
being a geek and not a spy I don't tend to fare well under torture!
You'll never know until you try :)
Re: (Score:2)
> > being a geek and not a spy I don't tend to fare well under torture!
> You'll never know until you try :)
Just imagine the geeky & fun role-playing games you can have with your SO.
She (in german Nazi-Uniform):
"You WILL give me ze passphrase jetzt!!"
You (unfortunate prisoner):
"No! Never!!"
She (in german Nazi-Uniform):
"Zen I will have to beat zis information out of you!"
You (unfortunate prisoner):
"Oh no's! Not the whip again!! Well...do what you must..." ^__^
Of course, make sure you have a safe
Re: (Score:2)
Sounds simple to me:
red = stop right now
yellow = not feeling comfy with things
green = go!
But I'm one of those Slashdot virgins with no SO, so what would I know
p.s. this might actually be a steganographic message, or maybe just a noise message to foil traffic analysis.
Re: (Score:2)
> > Of course, make sure you have a safe word when playing so you can stop.
red = stop right now
yellow = not feeling comfy with things
AHHH....OUUUUUCHH!!! = go!
There...fixed it for 'ya. ;-)
Re: (Score:2)
Re:they aren't very well going to admit defeat. (Score:5, Informative)
Except he's (more or less) right. James Ellis, at GCHQ (roughly the UK equivalent of NSA) had developed the basics of public key cryptography by the end of 1969. This was about 6 years ahead of Diffie Hellman and Merkle. In 1973, a GCHQ cryptographer, Clifford Cocks, realized that one-way functions would be an elegant way of achieving Ellis' insight. See http://cryptome.org/ukpk-alt.htm [cryptome.org] for example. This was some years ahead of RSA.
GCHQ and the NSA definitely would have exchanged this information. It's also quite possible that the US made some of these breakthroughs even earlier than the British; I've not paid much attention to anything NSA-related that has declassified in the last 5+ years.
Re: (Score:2)
Agreed! PK crypto, block ciphers, etc., was in my Elementary Number Theory textbook (1984, Kenneth Rosen). No freakin' way NSA didn't know how to do that before 1983--as he said, if it's not in a title, then they called it something else.
Re:they aren't very well going to admit defeat. (Score:5, Informative)
Public key encryption, that would be the crypto system invented at GCHQ in the UK by public servants .... but not published and then re-invented (independently) by RSA 6-7 years later ...
Re: (Score:3, Insightful)
While it is true that it would not be in his interest to admit if they are beat that does not imply that they are beat. And you would have to be an idiot to believe that they are. To pick up on three points from the video:
Their latest decoded message: (Score:5, Funny)
Be sure to drink your Ovaltine.
Re: (Score:2)
The point of the joke went so far over your head all you saw was a contrail.
I saw no such thing!
(I was looking down) [wikipedia.org]
*sigh* Your link + "A Christmas Story" = ??
Re: (Score:2)
Whatever! (Score:5, Insightful)
I'm with Shamir, the only correct response here is: "Yeah, right, whatever", not "OMGOMGOMG, the NSA cAn readz my stuffz!!1".
Frankly, I don't see how any mathematician would want to waste his talent working for the NSA.
Re: (Score:2, Insightful)
Exactly. The USA intelligence agencies have shown their moronity and so many occasions. I'm not sure which is their greatest hit: helping traffic cocaine into American cities to fund arms transfers to Iran OR helping Osama Bin Laden build and develop the Al-Qaeda network. The NSA/CIA/FBI might be able to catch child porn wankers and craigslist hookers but the Chinese/Israelis/Indians will eat them for lunch. Go to a computer science dept. anywhere: You will see almost all Phd students are Chinese/Jewish/Ind
Re: (Score:3, Insightful)
Its just the old cold war idea of get them young.
Years later your "Chinese/Jewish/Indian" is going to sit in front of a mutil billion $ contract with a local build %.
If trained in the US who do you think they will recall fondly ?
France, Italy, Brazil, Germany, Russia?
The USA hopes years of quality education will give them that "reality distortion" edge.
Then when they sign up for a few billions of $ worth of US har
Re: (Score:2)
The problem is, that in his historic recount, he is correct. So there is no reason to disbelieve him when he says things about the current state of affairs.
Except of course, that he is a spook.
Re:Whatever! (Score:5, Interesting)
Let me tell you from firsthand experience. You cannot even fathom the awesomeness that goes on inside the cube unless you work there. It is not like Hollywood portrays it, but there is a whole lot of cool going on in there. That is why people work for the NSA. Now, I have philosophical disagreements with how the NSA ran business during the Bush years and I left that industry for aerospace. That being said if any of my former colleagues tell me that things have changed I think that I would go back.
Re: (Score:3, Insightful)
If you're a mathematician especially, you'll have nothing to show for it, and if your reports ever get published in the future, they'll be long obsolete and irrelevant.
Re:Whatever! (Score:5, Insightful)
Academia is not the only profession that provides job satisfaction and a sense of fulfillment. Guess what, 99.9% of the world's population lives a happy life without ever publishing anything.
Re: (Score:3, Funny)
99.9% of the world's population is, well, the bottom 99.9% of the world. We're talking about the very smartest and most gifted people. The sort that shouldn't be happy if they do not achieve something.
Re:Whatever! (Score:4, Insightful)
Who says the best always have to get their kicks off with public masturbation? While they may never be able to publish, it is also quite likely they will be exposed to concepts and ideas they never would have had the chance to be exposed to otherwise. I'm sure a very large percentage of these sorts of people are driven by a desire to self-improve.
Re: (Score:3, Informative)
99.9% of the world's population is, well, the bottom 99.9% of the world. We're talking about the very smartest and most gifted people. The sort that shouldn't be happy if they do not achieve something.
You are confusing genius with ambition. Not all geniuses want to take over the world. Some just want to lead a happy life.
Re: (Score:2)
> Guess what, 99.9% of the world's population lives a happy life without ever publishing anything.
Citation needed.
Re: (Score:2)
Sure, I accept that the toys are great, but scientifically? It's time wasted. At some point people are going to ask what did you accomplish?
If you're a mathematician especially, you'll have nothing to show for it, and if your reports ever get published in the future, they'll be long obsolete and irrelevant.
Who cares? You're getting paid to do what you love and are provided with all the toys you can think of to do that stuff with. If I was a mathematician, I wouldn't really consider that sort of job to be unfulfilling. (Ethical and moral dilemmas are another matter.)
Re: (Score:2)
for people working in the real world, they can achieve real world outcomes (god i'm damned to management aren't I?).
Re: (Score:2)
At some point people are going to ask what did you accomplish?
If you're a mathematician especially, you'll have nothing to show for it
"I could tell you, but then I'd have to kill you afterwards". And to be honest, I doubt anyone with "Mathematician, NSA" on their CV will ever have trouble finding work. Lots of others with science degrees work for private research, you'll just be another one of those.
Re: (Score:2)
If you're a mathematician especially, you'll have nothing to show for it
So you can't brag to your friends, you can still feel quite fulfilled knowing that your work is not only important, American (or your home nation, for other intelligence agencies) lives may be saved by your hard work.
Furthering science isn't the only way a scientist, engineer, or mathemetician can feel fulfilled.
Re: (Score:3, Insightful)
Considering the way the NSA has behaved in the last 9 years, I'd say it was way more likely that your work would be used to spy on innocent Americans, prop up phony wars, gather dirt on Administration political opponents, etc.
Re:Whatever! (Score:5, Insightful)
Considering the way the NSA has behaved in the last 9 years
You mean, considering the reports we have heard. There's a pretty obvious selection bias, in that only the illegal activities (which there certainly are, sanctioned or otherwise) will be notable enough to publish and publicize. I highly doubt that illegal activities accounted for more than 1% of work performed by the NSA (again, including both sanctioned and unsanctioned activities), let alone 51% for cryptologic work to be 'more likely' to be used illegaly.
Why do I have doubts about this post? (Score:2, Interesting)
But not, apparently, a lot of grown up usage of the English language.
Some people like knowing things that other people don't know and having secrets. Some people like adding to the store of human knowledge, and knowing that they have left the world a slightly better informed or capable place. Personally, I know from experience which type I prefer to work with, and it's not the "I'm a member o
Re: (Score:2)
"We know Saddam has WMD, but we can't show you what we know because it's secret!". Everybody knows how that argument went in Iraq.
We do?
They did show us what they knew. It just turned out to be crap. Did you really need to venture into historical revisionism in order to support your point?
Until (Score:2)
The wonderful unlimited budget (Score:2)
Go get your quantum computer - NSA will just build a 10 bazillion node cluster of them.
They will just brute force your solution into the mud if it comes to that.
Quantum of Solace (Score:2)
[D]irector Brian Snow said that cryptographers for the NSA have been losing ground to their counterparts in universities and commercial security vendors for 20 years.
Until a working quantum computer is made.
That's just what they want you to think. Secretly, they already have a quantum computer that can decrypt anything near-instantly. They call it TRANSLTR. Okay, maybe not, but it would make a great Dan Brown novel [wikipedia.org].
Re: (Score:3, Funny)
Re: (Score:2)
NSA didn't know about public key crypto? (Score:5, Interesting)
I don't think so... public key cryptography was discovered by the GCHQ at least a decade before it was discovered in the public sphere: http://cryptome.org/ukpk-alt.htm [cryptome.org]
Re: (Score:2)
The US was only willing to share nuclear weapon designs with the UK after it became clear that the UK was quite capable of designing and building its own nukes - and even then, it was on the condition that the US effectively still owned them and had control of their use.
Re: (Score:2)
Crypto is only the Beginning (Score:4, Insightful)
Re:Crypto is only the Beginning (Score:4, Funny)
Crypto's not the weak link in security anymore
That's what you think.
Re: (Score:2)
That's what you think.
Unfortunately most people won't find this insightful.
Because it's not.
Of course that is what introspekt.i thinks. That is why he wrote it.
phantomfive did not offer any new or insightful discussion to this tread.
Re: (Score:2)
If the key-size is adequate, then yes. I am. You can not brute force a 256bit symmetric key cipher, not on this planet anyways. I defy you to aquire all of the power that would be needed to make modern computers count from 0 to 2^256. That number is a hell of a lot bigger than I think you think it is.
Now, could the NSA be using other, perhaps unknown attacks, on things like AES256? That's entirely possible, but they are not brute forcing it.
Re:Crypto is only the Beginning (Score:5, Interesting)
Nah. The money is now in electromagnetic remote sensing; reading your screen and listening to your keyboard from a mile away. That, and psy-ops. Humans still control keys. Humans always make at least one mistake. Google's mail accounts were cracked because their subjects could be coaxed to visit malicious websites, after all.
Re: (Score:2)
"I think the real security money now is in automated (or proven) software verification and model checking. Private industry is only beginning to understand this, and as a whole, probably will not employ it for some time to come. Why bother testing for security errors when you can prove they don't exist?"
Yeah, we were laughing about this in my college CS classes 20 years ago. So the drunken party's back again, eh?
Re: (Score:2)
> > Why bother testing for security errors when you can prove they don't exist?"
> Yeah, we were laughing about this in my college CS classes 20 years ago. So the drunken party's back again, eh?
Yeah, why bother testing his slashdot post for errors if he can prove (via "post verification and checking") that his post on Slashdot was exactly what he wanted to post?
Software verification has
Re: (Score:2)
Crypto's not the weak link in security anymore
When I read other people's crypto code, I still find they get it wrong the majority of the time.
RSA (Score:2)
The NSA may not have had RSA, but GCHQ did - and they developed it years before R, S and A.
NSA vs. PUBLIC (Score:5, Insightful)
> cryptographers for the NSA have been losing ground to their
> counterparts in universities and commercial security vendors for
> 20 years, but still maintain the upper hand in the sophistication
> of their crypto schemes and in their ability to decrypt.
Nevermind the intellectual "my code's better than yours" games
between arguably otherwise brilliant researchers.
Where the NSA certainly has 'maintained the upper hand' is in real
life versus ordinary people. The technology of surveillance has
gotten orders of a magnitude better and surrounding laws have been
adapted to make it fully legal to use that technology to the max
against The People (whereever they may be). Who in this discussion
encrypts their e-mails or uses 'sophisticated crypto schemes' as a
matter of course? At best it's maybe SSH here and there and the
occasional SSL site. The vast majority of traffic is plain-text, as
it's been since the days of papyrus. Hell, back in those days at
least only a few people could read it and thus had better privacy
than we mostly have today. Nevermind the ramifications of Facebook
and similar tools.
Mr. Shamir can engage in discussions of who developed Public Key
Cryptography first or not. It's all nonsense, because as brilliant
as the concept is, the PUBLIC has no part in it to 99.99% and
therefore we can consider it a complete FAILURE on grounds of lack
of acceptance and widespread use. Meanwhile the NSA sits back and
laughs, as their electronic tentacles filter through PUBLIC('s)
traffic...any traffic...and mostly doesn't have to bother with
breaking anything. Cuz we 'oh-so-clever' geeks have failed
miserably. If the NSA has any problem, then it's to store and
process/search through the data they get...not the acquisition.
Re:NSA vs. PUBLIC (Score:5, Funny)
I'm never happy with the way my browser handles line-breaking, so I'm eternally grateful to you for taking the initiative and doing it yourself.
Re: (Score:2)
> I'm never happy with the way my browser handles line-breaking, so I'm
> eternally grateful to you for taking the initiative and doing it yourself.
More a result of using an external editor. And even though I have a feeling you ;-)
were being ironic, I DO find it easier to read with a normal line-length, as
opposed to reading across the whole damn (wide)screen.
Re: (Score:2)
A friendly suggestion: with flowed content such as html you should never impose linebreaks for non-formatting purposes, i.e. you could use them with code or poems. Otherwise one line equals one paragraph. Your editor can surely soft-wrap the display while retaining proper flow in the text.
The browser handles the flowing, if you prefer sh
Re: (Score:2)
OK, thanx for the tip. Shall now use:
":set wrap linebreak textwidth=0"
This will soft-wrap the lines. /..
The written text will still go to the end of the editor/display though. Haven't yet found a way to limit the line length (say, 70 characters) for easy reading, yet still have it only soft-wrapped for final posting to
Re: (Score:2, Insightful)
That's absolutely true. In addition to brute-force decryption and other methods, the NSA has discovered what scammers have known all along. You don't need to decrypt someone's stuff if they'll give you the keys themselves. It's easier to compromise someone's box and keylog their keys than it is to decrupt the information by force.
The NSA spends a tremendous amount of effort on social engineering and subversive key acquisition. Those methods are much faster and easier.
Re: (Score:2, Interesting)
If the NSA has any problem, then it's to store and process/search through the data they get...not the acquisition.
Well that, and interagency cooperation, which the Department of Homeland Security was designed to fix. Instead, it now pursues its own agenda and has proven counterproductive towards those ends. The value of intelligence is not in whether or not you can acquire the information, but whether you can do so in a timely and reliable fashion, and have the resources to analyze it to determine trends, form conclusions, and execute decisions in a timely manner. Intelligence operations don't have a defined start and
More goverment disinformation... (Score:3, Funny)
In truth, the NSA is hundreds of years [milk.com] ahead of the rest of the world when it comes to cryptography.
Peer review? (Score:3)
That's all well and good for cryptanalysis, which is more or less provable, but for new encryption algorithms the more eyes you have looking at your algorithm the more certain you can be of its strengths. Not letting people look at your encryption algorithms seems to be relying on security through obscurity.
Re: (Score:3, Insightful)
That's all well and good for cryptanalysis, which is more or less provable, but for new encryption algorithms the more eyes you have looking at your algorithm the more certain you can be of its strengths. Not letting people look at your encryption algorithms seems to be relying on security through obscurity.
It isn't about security through obscurity. They are cheating because they get ideas from the academics but don't have to return the favor. It becomes a pull relationship and ignores the push.
Think of it this way (with made up stats), NSA has 40% of all available industry resources and ideas, while the academics have the remaining 60%. So, while the NSA only has 40% but gets to view 100%, while academics have 60% but are stuck at 60%. If you use your position of power to use all available resources, even
How I know this is bullshit: (Score:3, Funny)
Original quote:
'I do believe NSA is still ahead, but not by much -- a handful of years,' says Snow. 'I think we've got the edge still.'
Slashdot headline:
NSA Still Ahead In Crypto, But Not By Much
Sorry, Snow. But someone “thinking” that something is that way, has nothing to do with what it actually is.
There are people out there who still “think” that earth is flat, the sun revolves around it, and that there is a bearded man in the sky.
Then again, if you follow the money/power, you realize quickly, why that empty and pointless quote gets thrown around the Internet... ;)
Yeees NSA... you’re still the best... mama still loves you... really! *pat-pat*
I wish that NO agency of any country is “ahead” in crypto. It’s like saying that Jack the Ripper is still ahead of the police. Not a world you want to live in.
Re: (Score:3, Interesting)
Yeah, but the way most intelligence services work is that it's not like the employees show up at the NSA building every day and sit in a cubicle doing encryption research. At least with the CIA and DOD they just put civilian academic researchers on the payroll and get "first dibs" on new stuff and also get to direct their research. The CIA does this with journalists too. They still work at the NY Times etc. but the CIA sees all their information first and decides what will get printed and what will stay pri