Gentoo Archives: gentoo-user

From: Sebastian Wiesner <basti.wiesner@×××.net>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] loop-aes + extra-ciphers...
Date: Wed, 25 Jun 2008 22:11:44
Message-Id: 200806260011.00224.basti.wiesner@gmx.net
In Reply to: Re: [gentoo-user] loop-aes + extra-ciphers... by Jason Rivard
1 "Jason Rivard" <jase.rivard@×××××.com> at Wednesday 25 June 2008, 23:53:23
2 > > > The only thing that cryptography attempts to do is reduce the
3 > > > **probability** of cracking the key and gaining access to the data as
4 > > > low as possible.
5 > >
6 > > No news. That's, why cryptology defines "security" not as "being
7 > > impossible
8 > > to crack", but as "being sufficiently improbable to crack". The only
9 > > cipher, that can't be "brute-forced", is the OTP, which is
10 > > considered "perfectly secure".
11 >
12 > There is no such thing as perfectly secure,
13
14 A OTP cannot be broken using brute force, so the term "perfectly secure"
15 fits here, imho, at least a bit ;)
16
17 > > In such a case, the question is, if the data, you ciphered, is really
18 > > worth the effort of putting a super computer into work for a long time
19 > > to try any possible passphrase.
20 >
21 > Mr. Walters' claim is not that they would put a single super-computer to
22 > decrypting it, but a "network of supercomputers".
23
24 Does that difference really matter for ciphers like AES or at least for
25 brute-force attacks on random 256-bit keys?
26
27 > I truly don't think you
28 > have to worry about that occurring, unless you are deemed a danger to US
29 > National Security. Even then, AES is very hard to crack. The major
30 > weakness is the person who encrypts the data. Under questioning, most
31 > will give up their keys.
32 >
33 > > > Cryptology is, at least partly about finding the weakest link,
34 > > > because that is what is likely to be attacked in any cryptosystem.
35 > >
36 > > Of course, absolutely true. Hard disk encryption is by far not
37 > > perfect, just look at the cold boot attacks that gained public interest
38 > > in the last time. But you didn't talk of _cryptosystems_ in your
39 > > previous posts, you did talk about _algorithms_.
40 >
41 > By themselves algorithms are relatively useless. It is only the
42 > application of those algorithms that make them useful.
43
44 Still, there is a difference between the algorithm as such and a
45 cryptosystem applying this algorithm.
46
47 Btw, apart from general stuff like weak passphrases, that apply to most
48 cryptosystems, really bad leaks often came from weak algorithms. Consider
49 WEP.
50
51 > > > A final thought: It is a fact that both the US Navy and the NSA are
52 > > > *very* interested in cryptology and data security. The NSA also does
53 > > > have large networks of supercomputers that, using parallel,
54 > > > distributed or concurrent computing principles can crack keys more
55 > > > quickly than you may think.
56 > >
57 > > You can use simple mathematics to find out, that even the largest super
58 > > computers, having one peta flop, needs millions of years to perform an
59 > > exhaustive search through AES key space.
60 > >
61 > > Anyway, you may believe, what you want to believe, I'm just reflecting,
62 > > what
63 > > real experts like Bruce Schneier have been telling for years: It's
64 > > wrong to trust into simple ciphers, but it's equally wrong, to believe,
65 > > that anything can be broken.
66 >
67 > It is equally wrong to believe that any cipher is immune to attack
68
69 I don't and I did not say so, things like the Debian disaster bring you back
70 to reality from dreams ...
71
72 --
73 Freedom is always the freedom of dissenters.
74 (Rosa Luxemburg)

Attachments

File name MIME type
signature.asc application/pgp-signature

Replies

Subject Author
Re: [gentoo-user] My last words on cryptology and cryptography. Chris Walters <cjw2004d@×××××××.net>