Re: AES HDD encryption was XOR
Victor Duchovni writes: -+- | The computing power of the microprocessor is still under | 32 powers of 2 from its inception, naive extrapolation | to the next 32 powers of 2 is unwise. Well taken, indeed. But what I am myself interested in is the relationship of the three main up-curves, Moore's for CPU horsepower per unit of money, and its two un-named siblings for storage and for bandwidth. As I read the tea-leaves, storage is doubling at perhaps a 12-month rate while bandwidth is faster still. Yes, these are laboratory figures, but the lab is where the action is. This tells me, I think, that the future of computing is ever more data-rich but, at the same time, that that data-richness is eclipsed by ever-increasing data-mobility. Suppose the doubling times are 18/12/9; then a decade is two orders of magnitude for CPU, three for storage, and four for bandwith. I do not see how this does not radically alter the economically optimal computing infrastructure or, for that matter, the nature of the problems we here are collectively paid to solve. This is, of course, all irrelevant if and when the Singularity occurs. Kurzweil's guess of 2035 is 27 years away, which is to say 18 powers of two out, not 32. Perhaps relevant to this list, imagine that the research described here: http://technology.newscientist.com/channel/tech/mg20026805.500-cultured-robots- make-sweet-music-together--.html was of two programs creating not music but a cipher. Thinking out loud, --dan [ just for amusement, 2008 world production of wheat and rice would each cover 53 squares, with maize coming in at 51 squares ] - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com
Re: AES HDD encryption was XOR
In the NBC TV episode of /Chuck/ a couple of weeks ago, the NSA cracked a 512-bit AES cipher on a flash drive trying every possible key. Could be hours, could be days. (Only minutes in TV land.) http://www.nbc.com/Chuck/video/episodes/#vid=838461 (Chuck Versus The Fat Lady, 4th segment, at 26:19) It's no wonder that folks are deluded, pop culture reinforces this. No, this is simple to do. What you is to start with a basic cracking engine. And then you add another one an hour later, and then an hour later add two, then add four the next hour and so on. If you assume that the first cracker can do 2^40 keys per second, then you're guaranteed to complete in 472 hours, which is only 20 days. And of course there's always the chance you'd do it in the first hour. For those who doubt being able to double the cracking power, Moore's law proves this is possible. QED. Jon - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: AES HDD encryption was XOR
On Mon, Dec 08, 2008 at 08:53:18PM -0800, Jon Callas wrote: In the NBC TV episode of /Chuck/ a couple of weeks ago, the NSA cracked a 512-bit AES cipher on a flash drive trying every possible key. Could be hours, could be days. (Only minutes in TV land.) http://www.nbc.com/Chuck/video/episodes/#vid=838461 (Chuck Versus The Fat Lady, 4th segment, at 26:19) It's no wonder that folks are deluded, pop culture reinforces this. No, this is simple to do. What you is to start with a basic cracking engine. And then you add another one an hour later, and then an hour later add two, then add four the next hour and so on. If you assume that the first cracker can do 2^40 keys per second, then you're guaranteed to complete in 472 hours, which is only 20 days. And of course there's always the chance you'd do it in the first hour. For those who doubt being able to double the cracking power, Moore's law proves this is possible. In the well-known Indian fable, the King was bankrupted by doubling grains of rice on a 64-square chess-board. Back in the USSR, every school-child learned this fable. Oh, and chess was pretty popular too... The fact that the fable refutes the *sustainability* of Moore's law seems to be under-appreciated on this side of the Iron-curtain. It is not a question of whether, but rather when the departure from Moore's law will take place. The computing power of the microprocessor is still under 32 powers of 2 from its inception, naive extrapolation to the next 32 powers of 2 is unwise. -- Viktor. - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: AES HDD encryption was XOR
Jerry Leichter wrote: ... accurately states that AES-128 is thought to be secure within the state of current and expected cryptographic knowledge, it propagates the meme of the short key length of only 128 bits. A key length of 128 bits is beyond any conceivable brute force attack - in and of itself the only kind of attack for which key length, as such, has any meaning. But, as always, bigger *must* be better - which just raises costs when it leads people to use AES-256, but all too often opens the door for the many snake-oil super-secure cipher systems using thousands of key bits. Oh, say it ain't so! ;-) In the NBC TV episode of /Chuck/ a couple of weeks ago, the NSA cracked a 512-bit AES cipher on a flash drive trying every possible key. Could be hours, could be days. (Only minutes in TV land.) http://www.nbc.com/Chuck/video/episodes/#vid=838461 (Chuck Versus The Fat Lady, 4th segment, at 26:19) It's no wonder that folks are deluded, pop culture reinforces this. - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
AES HDD encryption was XOR
http://www.heise-online.co.uk/security/Encrypting-hard-disk-housing-cracked--/news/112141: With its Digittrade Security hard disk, the German vendor Digittrade has launched another hard disk housing based on the unsafe IM7206 controller by the Chinese manufacturer Innmax. The German vendor prominently advertises the product's strong 128-bit AES encryption on its packaging and web page. In practice, however, the hard disk data is only encrypted using a primitive XOR mechanism with an identical 512-Byte block for each sector. -- Regards, ASK - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Re: AES HDD encryption was XOR
On Dec 7, 2008, at 4:10 AM, Alexander Klimov wrote: http://www.heise-online.co.uk/security/Encrypting-hard-disk-housing-cracked--/news/112141 : With its Digittrade Security hard disk, the German vendor Digittrade has launched another hard disk housing based on the unsafe IM7206 controller by the Chinese manufacturer Innmax. The German vendor prominently advertises the product's strong 128-bit AES encryption on its packaging and web page. In practice, however, the hard disk data is only encrypted using a primitive XOR mechanism with an identical 512-Byte block for each sector. Oh, but that 512-byte block is generated using Triple AES, and is highly, highly secure! :-) An interesting bit of wording from the site linked to above: According to current cryptography research, this would be virtually impossible, even with a short key length of only 128 bits. Although the sentence accurately states that AES-128 is thought to be secure within the state of current and expected cryptographic knowledge, it propagates the meme of the short key length of only 128 bits. A key length of 128 bits is beyond any conceivable brute force attack - in and of itself the only kind of attack for which key length, as such, has any meaning. But, as always, bigger *must* be better - which just raises costs when it leads people to use AES-256, but all too often opens the door for the many snake-oil super-secure cipher systems using thousands of key bits. -- Jerry - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]