Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Encryption Security News

NSA Still Ahead In Crypto, But Not By Much 208

Hugh Pickens writes "Network World summarizes an RSA Conference panel discussion in which former NSA technical director Brian Snow said that cryptographers for the NSA have been losing ground to their counterparts in universities and commercial security vendors for 20 years, but still maintain the upper hand in the sophistication of their crypto schemes and in their ability to decrypt. 'I do believe NSA is still ahead, but not by much — a handful of years,' says Snow. 'I think we've got the edge still.' Snow added that that in the 1980s there was a huge gap between what the NSA could do and what commercial encryption technology was capable of. 'Now we are very close together and moving very slowly forward in a mature field.' The NSA has one key advantage (besides their deep staff of Ph.D. mathematicians and other cryptographic experts who work on securing traffic and breaking codes): 'We cheat. We get to read what [academics] publish. We do not publish what we research,' he said. Snow's claim of NSA superiority seemed to rankle some members on the panel. Adi Shamir, the "S" in the RSA encryption algorithm, said that when the titles of papers in NSA technical journals were declassified up to 1983, none of them included public key encryption; 'That demonstrates that NSA was behind,' said Shamir. Snow replied that when technologies are developed separately in parallel, the developers don't necessarily use the same terms for them."
This discussion has been archived. No new comments can be posted.

NSA Still Ahead In Crypto, But Not By Much

Comments Filter:
  • by timmarhy ( 659436 ) on Tuesday March 09, 2010 @03:28AM (#31410824)
    what else would you expect from a public servant. he won't admit the private sector has them beat because it'd be the end of his job.
  • by jpmorgan ( 517966 ) on Tuesday March 09, 2010 @03:40AM (#31410884) Homepage

    I don't think so... public key cryptography was discovered by the GCHQ at least a decade before it was discovered in the public sphere: http://cryptome.org/ukpk-alt.htm [cryptome.org]

  • Sure (Score:1, Interesting)

    by FooRat ( 182725 ) on Tuesday March 09, 2010 @03:47AM (#31410914)

    "Snow replied that when technologies are developed separately in parallel, the developers don't necessarily use the same terms for them."

    Sure, and I invented cars 200 years ago, but I didn't call it a car so someone else got the credit.

    The NSA may have a "deep staff of Ph.D. mathematicians and other cryptographic experts who work on securing traffic and breaking codes" but let's face it, government departments are not exactly known for being the most motivated of the various sectors, and that's further exacerbated if you know you aren't going to get credit for your work as opposed to being kept secret ... I mean, in academia, one of the major motivations for leading scientists is that they get widespread recognition for their work. I suspect the funding to maintain that "deep staff" of experts probably serves more to keep those experts from being more productive 'elsewhere'. And of course they have to maintain that they are 'ahead' if they want to keep getting funded year after year, so I'd take it with a pinch of salt.

  • Re:Sure (Score:3, Interesting)

    by Anonymous Coward on Tuesday March 09, 2010 @04:01AM (#31410978)

    Yeah, but the way most intelligence services work is that it's not like the employees show up at the NSA building every day and sit in a cubicle doing encryption research. At least with the CIA and DOD they just put civilian academic researchers on the payroll and get "first dibs" on new stuff and also get to direct their research. The CIA does this with journalists too. They still work at the NY Times etc. but the CIA sees all their information first and decides what will get printed and what will stay private.

  • by bytesex ( 112972 ) on Tuesday March 09, 2010 @04:24AM (#31411056) Homepage
    If you're never going to be able to decrypt the data, then you might as well cat /dev/random > /dev/sda. Because it's indistinguishable from random chaos.
  • by bytesex ( 112972 ) on Tuesday March 09, 2010 @04:32AM (#31411094) Homepage

    Nah. The money is now in electromagnetic remote sensing; reading your screen and listening to your keyboard from a mile away. That, and psy-ops. Humans still control keys. Humans always make at least one mistake. Google's mail accounts were cracked because their subjects could be coaxed to visit malicious websites, after all.

  • Re:Whatever! (Score:5, Interesting)

    by chuckymonkey ( 1059244 ) <charles DOT d DO ... AT gmail DOT com> on Tuesday March 09, 2010 @04:53AM (#31411182) Journal

    Let me tell you from firsthand experience. You cannot even fathom the awesomeness that goes on inside the cube unless you work there. It is not like Hollywood portrays it, but there is a whole lot of cool going on in there. That is why people work for the NSA. Now, I have philosophical disagreements with how the NSA ran business during the Bush years and I left that industry for aerospace. That being said if any of my former colleagues tell me that things have changed I think that I would go back.

  • Re:Whatever! (Score:1, Interesting)

    by Anonymous Coward on Tuesday March 09, 2010 @05:19AM (#31411248)

    I don't believe it. The government wants everyone to believe they are all powerful and know everything but obviously they don't. Either that or they let 9/11 happen on purpose. One or the other they suck. Look at that bunch of CIA douchebags that got suicide bombed by their own informant. How clueless can you be. It's so obvious the ISI are the ones in control in South Asia. All your high tech gizmos and satellites and some stone age goat farmers with Kalishnikovs are beating you. Haha.

  • by xtracto ( 837672 ) on Tuesday March 09, 2010 @07:49AM (#31411856) Journal

    You are assuming that whoever wants to break the encryption is doing a brute force attack.

    The classical [wikipedia.org]

    encryption breaking methods are mainly based on frequency and statistics. I am sure nowadays the NSA and other entities in charge of breaking encrypted content have more sophisticated methods.

  • by Kupfernigk ( 1190345 ) on Tuesday March 09, 2010 @08:11AM (#31411930)

    You cannot even fathom the awesomeness that goes on inside the cube ...there is a whole lot of cool going on in there

    But not, apparently, a lot of grown up usage of the English language.

    Some people like knowing things that other people don't know and having secrets. Some people like adding to the store of human knowledge, and knowing that they have left the world a slightly better informed or capable place. Personally, I know from experience which type I prefer to work with, and it's not the "I'm a member of the in crowd, you're not" type.

  • by CODiNE ( 27417 ) on Tuesday March 09, 2010 @08:54AM (#31412226) Homepage

    That's 1.15x10^77 possibilities.

    Are you aware that randomly generating a specific protein is much more difficult than that? I've heard a number around 1 in 10^113. That would be just ONE of the proteins we need for life.

    So. Either it needs to be rethought what is actually numerically possible, or that the genetic make-up of life was guided by chance.

  • by vlm ( 69642 ) on Tuesday March 09, 2010 @08:59AM (#31412272)

    Currently the best theories we got suggests there's a lower entropy limit of kT*ln 2 (the Von Neumann-Landauer limit) per operation, which is on the order of 10^-23 joule. The energy of the sun via E=mc^2 is on the order of 10^47 joule. So at most you can do is 10^70 operations but 2^256 = ~10^77. In other words you can't get through the keyspace before you run out of energy, even taking ideal assumptions.

    Well, if your strategy is guess and check, sure, OK. Wouldn't this plan be a hell of a lot cheaper:

    Estimate the total number of operations a genius level human brain can accomplish per second. I will be wildly optimistic and give it 10^3. Lets assume all thought is directed toward crypto and no daydreaming about the young lady working in accounting, or arguing about which was better, Kirk or Picard.

    Estimate the age of the NSA. Wikipedia claims formed in 1952 but theres plenty of cloak and dagger stuff going on before, so we'll round it to 10^3 years

    Estimate the total number of geniuses the NSA has hired over the years. The holy font of all wisdom, wikipedia, claims the number of employees is classified. However, they claim there's 18000 parking spaces at HQ. What the hell they do with 18K people is a mystery to me. My guess is theres 17990 supervisors, managers, directors, HR personnel, diversity directors, marketing personnel, and other executives and about 10 guys with pocket protectors doing all the work, in between their slashdot breaks. But lets say on a very long term average they have 10^5 geniuses working at any given instant.

    Lets further assume they never eat, sleep, have sex (duh, they're math majors). That gives us 31 million seconds per year. Well, we'll round that down for time to watch star trek reruns, eat pizza rolls, and read slashdot, so call it 10^7 seconds per year.

    So, you need to do about 10^3 * 10^3 * 10*5 * 10^7 = about 10^18 crypto related thought operations over the total lifetime of the NSA.

    In conclusion, you need to run WELL under 10^18 thought operations to figure out the back door they put into your encryption algorithm and/or reverse engineer their top secret decryption technology. A wee bit less than your 10^70 operations required to brute force one message. Plus, when you crack the entire algorithm, you've cracked all messages ever sent with it, not just one message.

  • Re:NSA vs. PUBLIC (Score:2, Interesting)

    by girlintraining ( 1395911 ) on Tuesday March 09, 2010 @10:46AM (#31413528)

    If the NSA has any problem, then it's to store and process/search through the data they get...not the acquisition.

    Well that, and interagency cooperation, which the Department of Homeland Security was designed to fix. Instead, it now pursues its own agenda and has proven counterproductive towards those ends. The value of intelligence is not in whether or not you can acquire the information, but whether you can do so in a timely and reliable fashion, and have the resources to analyze it to determine trends, form conclusions, and execute decisions in a timely manner. Intelligence operations don't have a defined start and end point. They are organic cycles which vary over time depending on current policy decisions. But it is a continual process, not a linear one as many here seem to think.

    Breaking codes is just a small part of the NSA's overall role within the government. Not only that, but they're not the ones spying on you domestically (generally); That's the job of the FBI (generally) unless a foreign national is involved or they suspect you have international ties with a terrorist organization or individual, or are pursuing criminal enterprise that could endanger national security (for example, if you're a network administrator at Honeywell, which does defense work), or if you are related to any of the above. And frankly, the FBI has a pattern of only investigating high value targets or those that gather media attention because their internal organizational structure is so inefficient that most of their resources are eaten in administrative overhead, leaving very little for actual field work. Unlike marines that live for the day they get to go outside the wire, most at the FBI are content to work 9-to-5 shifts moving papers from one desk to the next. Believe it or not, a major portion of the FBI's intelligence gathering is still open source, even given the low barriers to nearly unlimited access to anything in the private sector.

    That said, intelligence gathering proactively in sigint is a rarity -- it can provide leads, but generally it is reactive in nature. You have your boots in the ground finding names and getting a lay of the land. sigint resources are then allocated against the target to see if anything interesting can be found. In other words, the fact that the NSA has all your emails, phone records, etc., doesn't mean anything unless somebody files a report saying "Hey, check this guy out." There's plenty of files they have where they have good reason to suspect criminal activity but don't invest resources in it because it just isn't costing society enough yet to justify the judicial process.

8 Catfish = 1 Octo-puss

Working...