1 |
On 1/19/2012 06:00 PM, Neil Bothwick wrote: |
2 |
> On Fri, 20 Jan 2012 00:42:16 +0200, Alan McKinnon wrote: |
3 |
> |
4 |
>> There's no known way to decrypt a mail like that without the single |
5 |
>> private key needed (this works exactly like https traffic to your |
6 |
>> bank). I feel very confident saying "no known way" as cracking that |
7 |
>> puzzle has been the Holy Grail of maths prizes for 40 years and no-one |
8 |
>> has announced success. Seeing as mathematicians are a vain lot, and the |
9 |
>> one that accomplishes this feat with be showered with honour and glory |
10 |
>> for all time (making Einstein look like a child), it's a safe |
11 |
>> assumption that it hasn't been done yet. |
12 |
> |
13 |
> Unless he works for GCHQ/NSA or any other government's security services. |
14 |
> |
15 |
> Remember, RSA was invented several years before R, S and A did so, by a |
16 |
> mathematician working at GCHQ (the UK's communication monitoring |
17 |
> department). |
18 |
|
19 |
Possible, but not too likely*. RSA keys are based on two very large prime |
20 |
numbers and their composite. The two primes are hundreds of digits in length, |
21 |
and are used to generate the cipher (public) key, and the decipher (secret) |
22 |
key. After which their composite is found and the two primes are discarded. |
23 |
|
24 |
This type of public key cryptography is based on the difficulty of factoring |
25 |
very large composites with only two very large prime factors, and is based in |
26 |
number theory. It can be done, but it usually takes years using distributed |
27 |
computer networks. It is possible that the NSA has found a magic formula to do |
28 |
such factoring, but I find it more likely that the US Navy or the CIA would do |
29 |
so first. Remember, the NSA exists to monitor communications for "suspicious" |
30 |
activity and this is what most of their supercomputers are used for (sifting |
31 |
many emails, web page interactions, telephone conversations, and the like). |
32 |
|
33 |
While I am sure the NSA has its share of cryptologists, and cryptographers, I |
34 |
would hazard to say that the Navy has more, and so probably does the CIA/MI5 |
35 |
(or is it MI6 now?). |
36 |
|
37 |
*DISCLAIMER: With any public key cryptosystem, there is a risk that you will be |
38 |
using keys that have already been cracked. If so, anyone who knows the crack |
39 |
could decrypt your messages. |
40 |
|
41 |
Chris |