well I was going to ask where I can download one of those time travel machines, but since you're going to be like that I'll just wait! ;)
Brad > (Brad, concerning my earlier reply: I was just kidding with ya, nothing > personal.) Don't worry, i'm quite used to sarcasm. Actually, i've heard reports that most of the goverment secret security places are way behind in Technology. I thought you might have had an inside track on something though. Oh well. BTW I don't have an SUV, it's a Dakota, and Walmart is across the street from me! > > John Hebert > > -----Original Message----- > From: Mat Branyon > To: [email protected] > Sent: 6/18/03 1:24 PM > Subject: Re: [brlug-general] RE: NSA's decryption clusters vs GPG, et.al. > > You are talking in code again I think > > On Wed, 2003-06-18 at 13:00, John Hebert wrote: > > Call me sillier, but if I knew that for certain, do you think I would > be > > discussing it on a public mailing list? > > > > It was a joke, based on exaggerated extrapolation. Now shut up, watch > some > > TV, and then drive your SUV to Walmart to buy something. > > > > John Hebert > > > > -----Original Message----- > > From: Brad N Bendily > > To: '[email protected] ' > > Sent: 6/18/03 12:47 PM > > Subject: Re: NSA's decryption clusters vs GPG, et.al. was RE: GPG does > not > > pro vide "end to end encryption", but only mail c onte nt encryption > was RE: > > [brlug-general] Cox and smtp pain today. > > > > call me silly but, do you know this? or is that your best guess? > > > > Brad B > > > > > > > > On Wed, 18 Jun 2003, John Hebert wrote: > > > > > Well Alvaro, if you really insist we discuss this on a public list, > > then I > > > first must give a shout out to the ECHELON homeys: Howdy! > > > > > > GPG has yet to broken, as far as is publicly known. However, you > admit > > > yourself that the estimates for brute force attack are outdated. > > > > > > Just what do you think the DOD did with all of those old Cold War > > bunkers > > > around DC? They filled em full of blade stuffed racks running Linux > > clusters > > > and put em to work in parallel doing brute force decryption. They > were > > gonna > > > upgrade to OpenBSD but they found out Theo de Raadt is a commie. > > > > > > Let's do some math: > > > > > > Let's say it takes 1 computer 1,000,000 years to brute force message > > A. > > > Then, theoretically, it will take 2 computers half that time: > 500,000 > > years. > > > 3 computers: 333,333 years, ... and so on. > > > > > > Eventually, it comes down to this: 1 billion computers working in > > parallel > > > will decrypt message A in .365 of a day, about 8 hours. And 10 > billion > > > computers will decrypt message A in less than an hour. And 100 > billion > > > computers will decrypt the message before you actually ask the > > computers to > > > do so. > > > > > > Now, I know you are an intelligent individual, but do you really > think > > that > > > the DOD was paying $600 for a hammer since WWII? No. The DOD paid > the > > normal > > > $23 for a contractor supplied hammer, and put the rest into a long > > term > > > black ops IT project in coordination with the defense contractors > and > > built > > > up the NSA's toy room into an IT infrastructure that would make the > > Krells's > > > underground labs in "Forbidden Planet" look like the work of > > brain-damaged > > > infants. > > > > > > Don't even get me started on their time-space travel machines. > > > > > > :) > > > > > > John Hebert > > > > > > -----Original Message----- > > > From: Alvaro Zuniga > > > To: [email protected] > > > Sent: 6/18/03 10:54 AM > > > Subject: Re: GPG does not provide "end to end encryption", but only > > mail c > > > onte nt encryption was RE: [brlug-general] Cox and smtp pain today. > > > > > > Thanks John: > > > > > > How possible is for one of this messages to be decrypted? I have > read > > > that GPG > > > encryption has yet to be broken. Is that an outdated fact? For what > I > > > understand about brute force algorithms, in order to break one of > this > > > > > messages, even with a small 8 character passphrase and say a 1024 > bit > > > encryption cipher, could take quit a bit of time. I am sure the > > numbers > > > I > > > have are quite outdated due to the hardware improvement, clustering, > > > etc. > > > since the time I took a lecture on this subject; however, this > number > > > should > > > fall at least on the years category, in which case the illicit love > > > affair > > > between x and y would most likely be over, is that not so( not about > > the > > > > > > affair )? I need to check out some info about those NSA's clusters. > > The > > > "mile" word really captivated my heart. > > > > > > In terms of the headers of a message. How necessary is to indicate > > that > > > a > > > particular message is encrypted? I can only suspect that hackers are > > the > > > only > > > people that benefit from this information. The only use I see is > for > > > the > > > programmer to know when to pop up passphrase box or fetch a public > > key. > > > I > > > would also expect the actual encrypted message to be free of headers > > > because > > > that would identify the fact that it is encrypted or at least some > > kind > > > of > > > hint. > > > > > > Thanks for the explanation, who knows what I was thinking. > > > > > > Alvaro Zuniga > > > > > > > > > Date: > > > Today 10:28:42 am > > > > > > > > > How possible is for one of this messages to be decrypted? I have > read > > > that GPG > > > encryption has yet to be broken. Is that an outdated fact? For what > I > > > understand about brute force algorithms, in order to break one of > this > > > > > messages, even with a small 8 character passphrase and say a 1024 > bit > > > encryption cipher, could take quit a bit of time. I am sure the > > numbers > > > I > > > have are quite outdated due to the hardware improvement, clustering, > > > etc. > > > since the time I took a lecture on this subject; however, this > number > > > should > > > fall at least on the years category, in which case the illicit love > > > affair > > > between x and y would most likely be over, is that not so( not about > > the > > > > > > affair )? I need to check out some info about those NSA's clusters. > > The > > > "mile" word really captivated my heart. > > > > > > In terms of the headers of a message. How necessary is to indicate > > that > > > a > > > particular message is encrypted? I can only suspect that hackers are > > the > > > only > > > people that benefit from this information. The only use I see is > for > > > the > > > programmer to know when to pop up passphrase box or fetch a public > > key. > > > I > > > would also expect the actual encrypted message to be free of headers > > > because > > > that would identify the fact that it is encrypted or at least some > > kind > > > of > > > hint. > > > > > > Thanks for the explanation, who knows what I was thinking. > > > > > > Alvaro Zuniga > > > > > > On Tuesday 17 June 2003 11:06 pm, will hill wrote: > > > > On 2003.06.17 20:23 John Hebert wrote: > > > > > I think he meant that something like Carnivore could easily pick > > up > > > the > > > > > fact that only one out of ~100 messages were encrypted by > parsing > > > the > > > > > message headers, and then somehow note that fact, or start a > brute > > > force > > > > > decryption of it on the square miles of the NSA's underground > > server > > > > > clusters. > > > > > > > > That's about it. Sometimes, the fact that you have something to > > tell > > > > someone is more important than what you say. A sudden burst of > > > encrypted > > > > messages between JD Edwards and Peoplesoft might spark Lary's > > > interest. > > > > > > > > _______________________________________________ > > > > General mailing list > > > > [email protected] > > > > http://brlug.net/mailman/listinfo/general_brlug.net > > > > > > _______________________________________________ > > > General mailing list > > > [email protected] > > > http://brlug.net/mailman/listinfo/general_brlug.net > > > > > > _______________________________________________ > > > General mailing list > > > [email protected] > > > http://brlug.net/mailman/listinfo/general_brlug.net > > > > > > > > > _______________________________________________ > > General mailing list > > [email protected] > > http://brlug.net/mailman/listinfo/general_brlug.net > > > > _______________________________________________ > > General mailing list > > [email protected] > > http://brlug.net/mailman/listinfo/general_brlug.net > > _______________________________________________ > General mailing list > [email protected] > http://brlug.net/mailman/listinfo/general_brlug.net >
