Gentoo Archives: gentoo-user

From: Chris Walters <cjw2004d@×××××××.net>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] Public key cryptography... (Used to be: Something about SOPA and PIPA)
Date: Thu, 19 Jan 2012 23:29:26
Message-Id: 4F18A704.6090704@comcast.net
In Reply to: Re: [gentoo-user] S.O.P.A and P.I.P.A and the blackout. by Neil Bothwick
1 On 1/19/2012 06:00 PM, Neil Bothwick wrote:
2 > On Fri, 20 Jan 2012 00:42:16 +0200, Alan McKinnon wrote:
3 >
4 >> There's no known way to decrypt a mail like that without the single
5 >> private key needed (this works exactly like https traffic to your
6 >> bank). I feel very confident saying "no known way" as cracking that
7 >> puzzle has been the Holy Grail of maths prizes for 40 years and no-one
8 >> has announced success. Seeing as mathematicians are a vain lot, and the
9 >> one that accomplishes this feat with be showered with honour and glory
10 >> for all time (making Einstein look like a child), it's a safe
11 >> assumption that it hasn't been done yet.
12 >
13 > Unless he works for GCHQ/NSA or any other government's security services.
14 >
15 > Remember, RSA was invented several years before R, S and A did so, by a
16 > mathematician working at GCHQ (the UK's communication monitoring
17 > department).
18
19 Possible, but not too likely*. RSA keys are based on two very large prime
20 numbers and their composite. The two primes are hundreds of digits in length,
21 and are used to generate the cipher (public) key, and the decipher (secret)
22 key. After which their composite is found and the two primes are discarded.
23
24 This type of public key cryptography is based on the difficulty of factoring
25 very large composites with only two very large prime factors, and is based in
26 number theory. It can be done, but it usually takes years using distributed
27 computer networks. It is possible that the NSA has found a magic formula to do
28 such factoring, but I find it more likely that the US Navy or the CIA would do
29 so first. Remember, the NSA exists to monitor communications for "suspicious"
30 activity and this is what most of their supercomputers are used for (sifting
31 many emails, web page interactions, telephone conversations, and the like).
32
33 While I am sure the NSA has its share of cryptologists, and cryptographers, I
34 would hazard to say that the Navy has more, and so probably does the CIA/MI5
35 (or is it MI6 now?).
36
37 *DISCLAIMER: With any public key cryptosystem, there is a risk that you will be
38 using keys that have already been cracked. If so, anyone who knows the crack
39 could decrypt your messages.
40
41 Chris

Attachments

File name MIME type
signature.asc application/pgp-signature

Replies

Subject Author
Re: [gentoo-user] Public key cryptography... (Used to be: Something about SOPA and PIPA) Neil Bothwick <neil@××××××××××.uk>