Re: AES HDD encryption was XOR

2008-12-11 Thread dan

Victor Duchovni writes:
-+-
 | The computing power of the microprocessor is still under
 | 32 powers of 2 from its inception, naive extrapolation
 | to the next 32 powers of 2 is unwise.

Well taken, indeed.

But what I am myself interested in is the relationship
of the three main up-curves, Moore's for CPU horsepower
per unit of money, and its two un-named siblings for
storage and for bandwidth.  As I read the tea-leaves,
storage is doubling at perhaps a 12-month rate while
bandwidth is faster still.  Yes, these are laboratory
figures, but the lab is where the action is.

This tells me, I think, that the future of computing
is ever more data-rich but, at the same time, that
that data-richness is eclipsed by ever-increasing
data-mobility.

Suppose the doubling times are 18/12/9; then a decade
is two orders of magnitude for CPU, three for storage,
and four for bandwith.  I do not see how this does not
radically alter the economically optimal computing
infrastructure or, for that matter, the nature of the
problems we here are collectively paid to solve.

This is, of course, all irrelevant if and when the
Singularity occurs.  Kurzweil's guess of 2035 is
27 years away, which is to say 18 powers of two out,
not 32.  Perhaps relevant to this list, imagine that
the research described here:

http://technology.newscientist.com/channel/tech/mg20026805.500-cultured-robots-
make-sweet-music-together--.html

was of two programs creating not music but a cipher.

Thinking out loud,

--dan

[ just for amusement, 2008 world production of wheat
  and rice would each cover 53 squares, with maize
  coming in at 51 squares ]

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: AES HDD encryption was XOR

2008-12-09 Thread Jon Callas



In the NBC TV episode of /Chuck/ a couple of weeks ago, the NSA  
cracked

a 512-bit AES cipher on a flash drive trying every possible key.
Could be hours, could be days.  (Only minutes in TV land.)

http://www.nbc.com/Chuck/video/episodes/#vid=838461
(Chuck Versus The Fat Lady, 4th segment, at 26:19)

It's no wonder that folks are deluded, pop culture reinforces this.


No, this is simple to do.

What you is to start with a basic cracking engine. And then you add  
another one an hour later, and then an hour later add two, then add  
four the next hour and so on.


If you assume that the first cracker can do 2^40 keys per second, then  
you're guaranteed to complete in 472 hours, which is only 20 days. And  
of course there's always the chance you'd do it in the first hour.


For those who doubt being able to double the cracking power, Moore's  
law proves this is possible.


QED.

Jon

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: AES HDD encryption was XOR

2008-12-09 Thread Victor Duchovni
On Mon, Dec 08, 2008 at 08:53:18PM -0800, Jon Callas wrote:

 In the NBC TV episode of /Chuck/ a couple of weeks ago, the NSA  
 cracked
 a 512-bit AES cipher on a flash drive trying every possible key.
 Could be hours, could be days.  (Only minutes in TV land.)
 
 http://www.nbc.com/Chuck/video/episodes/#vid=838461
 (Chuck Versus The Fat Lady, 4th segment, at 26:19)
 
 It's no wonder that folks are deluded, pop culture reinforces this.
 
 No, this is simple to do.
 
 What you is to start with a basic cracking engine. And then you add  
 another one an hour later, and then an hour later add two, then add  
 four the next hour and so on.
 
 If you assume that the first cracker can do 2^40 keys per second, then  
 you're guaranteed to complete in 472 hours, which is only 20 days. And  
 of course there's always the chance you'd do it in the first hour.
 
 For those who doubt being able to double the cracking power, Moore's  
 law proves this is possible.

In the well-known Indian fable, the King was bankrupted by doubling grains
of rice on a 64-square chess-board. Back in the USSR, every school-child
learned this fable. Oh, and chess was pretty popular too...

The fact that the fable refutes the *sustainability* of Moore's law
seems to be under-appreciated on this side of the Iron-curtain. It is
not a question of whether, but rather when the departure from Moore's
law will take place.

The computing power of the microprocessor is still under 32 powers of
2 from its inception, naive extrapolation to the next 32 powers of 2
is unwise.

-- 
Viktor.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: AES HDD encryption was XOR

2008-12-08 Thread William Allen Simpson

Jerry Leichter wrote:

...
accurately states that AES-128 is thought to be secure within the state 
of current and expected cryptographic knowledge, it propagates the meme 
of the short key length of only 128 bits.  A key length of 128 bits is 
beyond any conceivable brute force attack - in and of itself the only 
kind of attack for which key length, as such, has any meaning.  But, as 
always, bigger *must* be better - which just raises costs when it 
leads people to use AES-256, but all too often opens the door for the 
many snake-oil super-secure cipher systems using thousands of key bits.



Oh, say it ain't so! ;-)

In the NBC TV episode of /Chuck/ a couple of weeks ago, the NSA cracked
a 512-bit AES cipher on a flash drive trying every possible key.
Could be hours, could be days.  (Only minutes in TV land.)

http://www.nbc.com/Chuck/video/episodes/#vid=838461
(Chuck Versus The Fat Lady, 4th segment, at 26:19)

It's no wonder that folks are deluded, pop culture reinforces this.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


AES HDD encryption was XOR

2008-12-07 Thread Alexander Klimov
http://www.heise-online.co.uk/security/Encrypting-hard-disk-housing-cracked--/news/112141:

  With its Digittrade Security hard disk, the German vendor
  Digittrade has launched another hard disk housing based on the
  unsafe IM7206 controller by the Chinese manufacturer Innmax.
  The German vendor prominently advertises the product's strong
  128-bit AES encryption on its packaging and web page. In
  practice, however, the hard disk data is only encrypted using
  a primitive XOR mechanism with an identical 512-Byte block for
  each sector.

-- 
Regards,
ASK

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: AES HDD encryption was XOR

2008-12-07 Thread Jerry Leichter

On Dec 7, 2008, at 4:10 AM, Alexander Klimov wrote:

http://www.heise-online.co.uk/security/Encrypting-hard-disk-housing-cracked--/news/112141 
:


With its Digittrade Security hard disk, the German vendor
Digittrade has launched another hard disk housing based on the
unsafe IM7206 controller by the Chinese manufacturer Innmax.
The German vendor prominently advertises the product's strong
128-bit AES encryption on its packaging and web page. In
practice, however, the hard disk data is only encrypted using
a primitive XOR mechanism with an identical 512-Byte block for
each sector.
Oh, but that 512-byte block is generated using Triple AES, and is  
highly, highly secure!  :-)


An interesting bit of wording from the site linked to above:   
According to current cryptography research, this would be virtually  
impossible, even with a short key length of only 128 bits.  Although  
the sentence accurately states that AES-128 is thought to be secure  
within the state of current and expected cryptographic knowledge, it  
propagates the meme of the short key length of only 128 bits.  A key  
length of 128 bits is beyond any conceivable brute force attack - in  
and of itself the only kind of attack for which key length, as such,  
has any meaning.  But, as always, bigger *must* be better - which  
just raises costs when it leads people to use AES-256, but all too  
often opens the door for the many snake-oil super-secure cipher  
systems using thousands of key bits.

   -- Jerry


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]