How the NSA may have cracked encryption

How the NSA may have cracked encryption

Author
Discussion

MartG

Original Poster:

20,683 posts

204 months

Friday 16th October 2015
quotequote all
Interesting article - it's amazing what can be done with a budget of several $billion

https://freedom-to-tinker.com/blog/haldermanhening...

jbudgie

8,929 posts

212 months

Monday 19th October 2015
quotequote all
Interesting, as you say.

But when 'the singularity ' arrives none of us will be safe.


eldar

21,763 posts

196 months

Monday 19th October 2015
quotequote all
jbudgie said:
Interesting, as you say.

But when 'the singularity ' arrives none of us will be safe.
Or all of us will.

russ_a

4,581 posts

211 months

Saturday 24th October 2015
quotequote all
You could always write a letter and deliver it by hand!

Joey Ramone

2,150 posts

125 months

Saturday 24th October 2015
quotequote all
eldar said:
Or all of us will.
It's the ultimate 'heads or tails?'. Except the winner gets utopia, and the loser gets something very, very different.

marshalla

15,902 posts

201 months

Saturday 24th October 2015
quotequote all
Not so much cracking encryption as exploiting a weakness in the implementation. From the sound of it, they still can't crack a proper implementation in real-time (yet).

TheExcession

11,669 posts

250 months

Monday 26th October 2015
quotequote all
There's a nice video here explaining how the mathematics work for Elliptic Curve Diffie Hellman key exchange and cryptography.

The maths is pretty hardcore but it is easy to follow the principles of what is going on and how it works.

0000

13,812 posts

191 months

Monday 26th October 2015
quotequote all
marshalla said:
Not so much cracking encryption as exploiting a weakness in the implementation. From the sound of it, they still can't crack a proper implementation in real-time (yet).
Ding, we have a winner. Nothing to see here.

deckster

9,630 posts

255 months

Tuesday 27th October 2015
quotequote all
0000 said:
marshalla said:
Not so much cracking encryption as exploiting a weakness in the implementation. From the sound of it, they still can't crack a proper implementation in real-time (yet).
Ding, we have a winner. Nothing to see here.
I disagree. It's not so much exploiting a weakness in the implementation as it is a salutatory reminder that all modern encryption relies on nothing more than a very large set of potential solutions that must each be individually checked to find the correct one, and therefore we are hoping that the expected effort that needs to be spent to check these solutions is either too large to complete in reasonable time, or at least is large enough to make it not worthwhile. Therefore what was secure 20 years ago (128 bit keys for example, or even 1024 bit in this case) is no longer secure on modern hardware for a suitably motivated and well-funded attacker - and that what is secure now, will not be in 5/10/20 years. And even that is barring any genuine breakthroughs in mathematics, algorithmics, or (more likely) hardware design.

Security isn't a one-time activity; you need to be on top of things all the time to stay ahead of the game.

0000

13,812 posts

191 months

Tuesday 27th October 2015
quotequote all
I struggle to see using a predictable prime as anything other than a weakness in the implementation. Change the implementation and the problem goes away.

I'd imagine the authors behind bcrypt and the like see not adapting to increases in hardware performance as a weakness in the algorithm.

marshalla

15,902 posts

201 months

Tuesday 27th October 2015
quotequote all
0000 said:
I struggle to see using a predictable prime as anything other than a weakness in the implementation. Change the implementation and the problem goes away.

I'd imagine the authors behind bcrypt and the like see not adapting to increases in hardware performance as a weakness in the algorithm.
This.

They haven't broken the asymmetric encryption used during the shared key-exchange mechanism, they've calculated some common shared keys used by broken implementations. Change the way the shared keys are produced and the weakness is reduced.