True, but not unsurmountable. Depends on the recipient.
Additionally with public key encryption you are using the recipient's public key to encrypt.
The real issue is determining who and what to monitor.

On 08/13/2013 04:54 PM, John Abreau wrote:
If the individual in question encrypts only high-value messages, and doesn't bother encrypting everything else, like grocery lists, birthday greetings, and all their mundane day-to-day communication, then it's easy for the NSA to target their high-value messages and get good results.

On the other hand, if the individual routinely encrypts *everything*, and if the metadata does not clearly identify which messages are of interest, then it becomes much harder.



On Tue, Aug 13, 2013 at 4:47 PM, Jerry Feldman <[email protected] <mailto:[email protected]>> wrote:

    Let's take the situation: NSA is watching you.
    They can intercept your email, crack your RSA or DSA key, and then
    they can discover the session keys. They are not interested in
    everybody's random encrypted emails, so if they focus on
    individuals who  interest them, the problem becomes smaller.


    On 08/13/2013 04:35 PM, John Abreau wrote:

        If you're talking about the NSA breaking into each and every
        person's home
        and copying their pgp keys off their desktop machine, that's
        an entirely
        separate question from intercepting encrypted email traffic as
        it passes
        across the Internet.



        On Tue, Aug 13, 2013 at 4:33 PM, John Abreau <[email protected]
        <mailto:[email protected]>> wrote:

                But - and this is important -- once a given
                recipient's key is cracked
                it remains cracked forever.

            Nope, sorry, each individual message has its own unique
            session key.
            Cracking the session key on one particular message tells
            you nothing
            about the session key on subsequent messages.



            On Tue, Aug 13, 2013 at 4:07 PM, Richard Pieri
            <[email protected]
            <mailto:[email protected]>>wrote:

                Kent Borg wrote:

                    I'll accept your math, and it makes my point. You
                    describe a facility
                    that can only brute-force a couple hundred 80-bit
                    keys a year.  Which
                    means brute-forcing 80-bit keys is not something
                    routine and cheap for
                    the NSA, not when they think they need a plaintext
                    copy of *everything*.

                Go back to PRISM. How did the NSA get all that traffic
                data? They asked
                for it, and the big providers handed it over. It
                stands to reason that the
                NSA has obtained SSL certificates from public CAs the
                same way. If so then
                the vast bulk of Internet traffic is already decrypted
                by the time it ends
                up on the NSA's storage servers. But even if this is
                not the case, SSL and
                TLS are vulnerable to chosen plain-text attacks (CRIME
                and BREACH). The
                protocols are vulnerable regardless of the keys or
                ciphers you use.

                This covers, what, 95% of the encrypted traffic on the
                Internet? Yes,
                there is a cost to running CRIME and BREACH attacks
                but it is a tiny cost
                compared to exhaustive search/brute force.

                Now, my noodling is based on some assumptions. One is
                that the NSA
                doesn't know about any weaknesses at all and therefore
                must brute force
                every key that isn't in the ~95% of automagically
                decrypted traffic.
                Another is that they're using off the shelf GPUs. I
                doubt that either of
                these is the case.

                Take a look at the current state of the art in Bitcoin
                mining. The
                fastest Bitcoin mining GPU manages 1.2 GH/s (billion
                hashes per second) at
                a cost of around $1000. Most lesser GPUs get around
                0.3 GH/s. A Butterfly
                mining box with a cost of $1250 performs 25 GH/s, an
                improvement of 20
                times that of the best GPU, and pushing 100 times the
                performance of lesser
                GPUs. ASICs offer a massive performance improvement
                for roughly the same
                cost.

                A 100 times performance improvement over my GPU
                noodling reduces the
                32-hour crack time to just 19 minutes. If there is a
                weakness in the cipher
                that reduces analysis time by another order of
                magnitude? Your 80-bit key
                will be cracked in less than 115 seconds.

                This is based on the assumption that the NSA can do no
                better than the
                state of the art in Bitcoin mining. I figure they can
                do better than that
                so a 500 times performance improvement over the GPU
                solution may be a more
                realistic figure. If so then your 80-bit key can be
                cracked in ~24 seconds.
                If the NSA has ASIC boxes that are 1000 times faster
                than my GPU noodling?
                11.5 seconds.

                More realistically, the NSA won't bother with brute
                forcing every key
                that they haven't gotten by asking. They'll use more
                sophisticated
                analysis, so maybe 3-5 seconds to break an 80-bit key?
                Maybe less? Depends
                on the cipher.

                Let's follow along with John's mailing list example:
                20,000 messages
                going through BLU per day. Let's assume that every one
                of them is encrypted
                with an 80-bit key unique to each recipient. And let's
                use the 24 second
                figure just for the example. That's 5.5 days to handle
                one day's worth
                mail. Seems like a lot. But -- and this is important
                -- once a given
                recipient's key is cracked it remains cracked forever.
                New mail to that
                recipient does not need to be cracked, just decrypted
                with whatever keys
                are associated with the recipient. The 5.5 days cost
                is a one-time cost of
                doing business. A crack attempt won't have to be
                performed for any given
                recipient until that recipient's "master" key is changed.

                This is the biggest problem with the "encrypt
                everything to keep the NSA
                out" argument. If a key is compromised then anything
                encrypted with it
                might as well be clear-text as far as the compromising
                party is concerned.

                --
                Rich P.

                ______________________________**_________________
                Discuss mailing list
                [email protected] <mailto:[email protected]>
                
http://lists.blu.org/mailman/**listinfo/discuss<http://lists.blu.org/mailman/listinfo/discuss>



            --
            John Abreau / Executive Director, Boston Linux & Unix
            Email [email protected] <mailto:[email protected]> / WWW
            http://www.abreau.net / PGP-Key-ID 0xD5C7B5D9
            PGP-Key-Fingerprint 72 FB 39 4F 3C 3B D6 5B E0 C8 5A 6E F1
            2C BE 99





-- Jerry Feldman <[email protected] <mailto:[email protected]>>
    Boston Linux and Unix
    PGP key id:3BC1EB90
    PGP Key fingerprint: 49E2 C52A FC5A A31F 8D66  C0AF 7CEA 30FC 3BC1
    EB90


    _______________________________________________
    Discuss mailing list
    [email protected] <mailto:[email protected]>
    http://lists.blu.org/mailman/listinfo/discuss




--
John Abreau / Executive Director, Boston Linux & Unix
Email [email protected] <mailto:[email protected]> / WWW http://www.abreau.net / PGP-Key-ID 0xD5C7B5D9
PGP-Key-Fingerprint 72 FB 39 4F 3C 3B D6 5B E0 C8 5A 6E F1 2C BE 99


--
Jerry Feldman <[email protected]>
Boston Linux and Unix
PGP key id:3BC1EB90
PGP Key fingerprint: 49E2 C52A FC5A A31F 8D66  C0AF 7CEA 30FC 3BC1 EB90

_______________________________________________
Discuss mailing list
[email protected]
http://lists.blu.org/mailman/listinfo/discuss

Reply via email to