Exactly, which is why I trust open standards and Bruce Schneier. There
are 4 possible ways to implement the standard. One may (possibly) have
a back door. The standard even describes the way to get around that
possibility if you choose that method and you are worried. And it was
all picked up and demonstrated before it was even included in normal
software (MS later included that algorithm in Vista).

As Schneier says: cryptographers are a very suspicious bunch.

Judah

On Thu, Sep 27, 2012 at 10:29 AM, Cameron Childress <[email protected]> wrote:
>
> Says you:
> http://www.schneier.com/essay-198.html
>
> On Thu, Sep 6, 2012 at 2:01 PM, Judah McAuley <[email protected]> wrote:
>
>> There are no secret back doors to open source encryption with public
>> algorithms. The only way to defeat it is with brute force attacks
>> and/or social engineering. The NSA and related group have a heck of a
>> lot of computing power at their disposal but if the people doing the
>> encryption know what they are doing (which is always a supposition
>> open to criticism) and applied, say, multiple rounds of encryption
>> with AES using a strong key and good salting then, yes, it would be a
>> very long brute force attack. Far easier to try and steal the keys.
>
>
> ...
>
>
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-community/message.cfm/messageid:355626
Subscription: http://www.houseoffusion.com/groups/cf-community/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-community/unsubscribe.cfm

Reply via email to