Pages:
Author

Topic: the ability to crack current public encryption. - page 3. (Read 5483 times)

legendary
Activity: 2198
Merit: 1311
hero member
Activity: 728
Merit: 500
165YUuQUWhBz3d27iXKxRiazQnjEtJNG9g
Oh, as for breaking AES by non-brute force:  no, I don't think they can.  AES is pretty good - not the best (Serpent probably had the best overall security of the finalists, but it came in second for performance reasons), but it's still a top-tier algorithm, and it has held up for a decade with no significant full-rounds attacks.  The best so far lets you break AES-128 in 2^126.1 operations.

It's always possible the NSA has something they're not telling us, but in the past they have chosen security over being able to decrypt others' communications:  when DES was adopted they modified it a little to protect against differential cryptanalysis, which was not publicly known at the time.  There's too much to lose by blindly hoping that the Bad Guys won't find the bug - AES is certified to protect Top-Secret information.  I would expect them to start the process for a new algorithm if the existing standard was found insecure.
hero member
Activity: 728
Merit: 500
165YUuQUWhBz3d27iXKxRiazQnjEtJNG9g
I'm 99.lotsofnines% certain that the NSA can't brute force even a 128-bit key.  Assuming they can try 1 trillion keys per second - that's 1 million machines each making 1 million tries per second which is probably a reasonable guess of their abilities - it would still take 2^128 / (1T * seconds_per_year) = 10^16 years.  Take a few zeroes off the end if you want to be really paranoid.

The only reason you need better than 128-bit is if quantum crypto becomes available, AND can perform Shor's Algorithm fast (like, 1 billion ops per second).  In that case it could crack 128-bit in a few hundred years.  If that scares you, use 256-bit which will simply never be brute-forced.

Most likely this new datacenter is for a) breaking weak keys (like if you seed your deterministic wallet from a short passphrase), which isn't really news - everyone already assumes they're able to do that; or b) data mining non-encrypted information, which shouldn't come as any surprise - I'd be shocked if this isn't just an expansion of an existing project, or c) other NSA stuff that doesn't involve brute-forcing 128+ bit keys.
legendary
Activity: 1512
Merit: 1049
Death to enemies!
AES might contain yet undisclosed mathematical flaw that renders the encryption next to useless. Actually from all three symmetric ciphers I consider 100% safe (Serpent, Twofish, AES), the AES have the greatest potential to contain undiscovered flaws.

But I'm 99,99999999999999999999999999999999999999999999999999999999% sure that NSA cannot search in reasonable time the entire 256-bit keyspace to rediscover key used for encryption. Or even the 50% of keyspace to get 50% chance of success. The laws of physics and thermodynamics makes this impossible.
legendary
Activity: 3920
Merit: 2349
Eadem mutata resurgo

No NSA can break 256bit AES by brute force.

That statement is slightly ambiguous (especially if you have omitted a comma) ... do you think NSA can or cannot break AES?

I agree with the boondoggle aspect of these huge govt. projects. Also the inevitable centralised nature of the resulting installations is cringeworthy.

Looking at the schematics here, it would only take a simple failure or attack on either the chillers (6) or the power substations (7) to render the entire complex useless.




.... a botnet or bitcoin is mush more resilient in that sense. Now if bitcoin hashing function could be homeomorphic to AES cracking ....
legendary
Activity: 1512
Merit: 1049
Death to enemies!
Some botnets have more than petaflop of procesing power and you can rent them for less than 100 bitcoins per 24 hours. Unlike the nuclear bomb that was urgently needed in war, the so called supercomputers are used to pump out the funds from national budget to build impressive but extremely expensive gizmos.

No NSA can break 256bit AES by brute force.
legendary
Activity: 1246
Merit: 1016
Strength in numbers
1000x wow, so now we need 16 more bits or something to get the same security.
legendary
Activity: 1764
Merit: 1002
can't you understand that there is already a thread started on this subject from yesterday?  there was no conversation going on in this thread:

https://bitcointalksearch.org/topic/m.806495

It was different question, for a different topic ... or didn't you read the forum properly?

The article is long and many faceted. There are several (actually many) topics in there relevant to bitcoin that could be discussed separately .... the other discussion was a lame "gee whiz", "but who cares" meandering thread with no topic in the OP that I could discern.... animated chanesque pictures of blondes to boot.

Thanks for being the concerned bitcoin web citizen though, we are all richer for it!

it wasn't a different question.  the OP already said he was surprised that there was a reference to this article already posted and there is only a quoted passage in the post; no question.

all this is quibbling so why don't we just consolidate all discussions relating to this article in the original thread like we usually do?
legendary
Activity: 3920
Merit: 2349
Eadem mutata resurgo
can't you understand that there is already a thread started on this subject from yesterday?  there was no conversation going on in this thread:

https://bitcointalksearch.org/topic/m.806495

It was different question, for a different topic ... or didn't you read the forum properly?

The article is long and many faceted. There are several (actually many) topics in there relevant to bitcoin that could be discussed separately .... the other discussion was a lame "gee whiz", "but who cares" meandering thread with no topic in the OP that I could discern.... animated chanesque pictures of blondes to boot.

Thanks for being the concerned bitcoin web citizen though, we are all richer for it!
legendary
Activity: 1764
Merit: 1002
can't you understand that there is already a thread started on this subject from yesterday?  there was no conversation going on in this thread:

https://bitcointalksearch.org/topic/m.806495
legendary
Activity: 3920
Merit: 2349
Eadem mutata resurgo
Can we post this article ten more times please?

... and you get to bitch about it being posted ten more times, ten more times? ... no thanks.

Why don't you put yourself up for moderator if you feel the need to be policeman so badly?

LOL!

At the DOE’s unclassified center at Oak Ridge, work progressed at a furious pace, although it was a one-way street when it came to cooperation with the closemouthed people in Building 5300. Nevertheless, the unclassified team had its Cray XT4 supercomputer upgraded to a warehouse-sized XT5. Named Jaguar for its speed, it clocked in at 1.75 petaflops, officially becoming the world’s fastest computer in 2009.

Meanwhile, over in Building 5300, the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES. In other words, they were moving from the research and development phase to actually attacking extremely difficult encryption systems. The code-breaking effort was up and running.

The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”


So can you hazard an answer if NSA are routinely cracking AES?? ... the point of question before you stuck your oar in and diverted the conversation ....
legendary
Activity: 1764
Merit: 1002
Can we post this article ten more times please?

... and you get to bitch about it being posted ten more times, ten more times? ... no thanks.

Why don't you put yourself up for moderator if you feel the need to be policeman so badly?

LOL!
legendary
Activity: 3920
Merit: 2349
Eadem mutata resurgo
Can we post this article ten more times please?

... and you get to bitch about it being posted ten more times, ten more times? ... no thanks.

Why don't you put yourself up for moderator if you feel the need to be policeman so badly?
newbie
Activity: 34
Merit: 0
searching but not coming up with much. care to link?
legendary
Activity: 1764
Merit: 1002
there are already 2 threads regarding same article on Discussion.
newbie
Activity: 34
Merit: 0
newbie
Activity: 34
Merit: 0
...or were you saying that because it has been posted a lot already? admittedly, i didn't check before i posted.
newbie
Activity: 34
Merit: 0
zerohedge was just highlighting some of the good stuff. its in wired april - cover story i believe.
legendary
Activity: 1764
Merit: 1002
Can we post this article ten more times please?
Pages:
Jump to: