Well your credibility is just shot to hell now. At 11:37 AM 6/18/2003 -0500, you wrote:
>That should be spelled "Krell's". Sorry for my faux pas. > >John Hebert > >-----Original Message----- >From: John Hebert >To: '[email protected] ' >Sent: 6/18/03 11:29 AM >Subject: NSA's decryption clusters vs GPG, et.al. was RE: GPG does not pro >vide "end to end encryption", but only mail c onte nt encryption was RE: >[brlug-general] Cox and smtp pain today. > >Well Alvaro, if you really insist we discuss this on a public list, then >I >first must give a shout out to the ECHELON homeys: Howdy! > >GPG has yet to broken, as far as is publicly known. However, you admit >yourself that the estimates for brute force attack are outdated. > >Just what do you think the DOD did with all of those old Cold War >bunkers >around DC? They filled em full of blade stuffed racks running Linux >clusters >and put em to work in parallel doing brute force decryption. They were >gonna >upgrade to OpenBSD but they found out Theo de Raadt is a commie. > >Let's do some math: > >Let's say it takes 1 computer 1,000,000 years to brute force message A. >Then, theoretically, it will take 2 computers half that time: 500,000 >years. >3 computers: 333,333 years, ... and so on. > >Eventually, it comes down to this: 1 billion computers working in >parallel >will decrypt message A in .365 of a day, about 8 hours. And 10 billion >computers will decrypt message A in less than an hour. And 100 billion >computers will decrypt the message before you actually ask the computers >to >do so. > >Now, I know you are an intelligent individual, but do you really think >that >the DOD was paying $600 for a hammer since WWII? No. The DOD paid the >normal >$23 for a contractor supplied hammer, and put the rest into a long term >black ops IT project in coordination with the defense contractors and >built >up the NSA's toy room into an IT infrastructure that would make the >Krells's >underground labs in "Forbidden Planet" look like the work of >brain-damaged >infants. > >Don't even get me started on their time-space travel machines. > >:) > >John Hebert > >-----Original Message----- >From: Alvaro Zuniga >To: [email protected] >Sent: 6/18/03 10:54 AM >Subject: Re: GPG does not provide "end to end encryption", but only mail >c >onte nt encryption was RE: [brlug-general] Cox and smtp pain today. > >Thanks John: > >How possible is for one of this messages to be decrypted? I have read >that GPG >encryption has yet to be broken. Is that an outdated fact? For what I >understand about brute force algorithms, in order to break one of this >messages, even with a small 8 character passphrase and say a 1024 bit >encryption cipher, could take quit a bit of time. I am sure the numbers >I >have are quite outdated due to the hardware improvement, clustering, >etc. >since the time I took a lecture on this subject; however, this number >should >fall at least on the years category, in which case the illicit love >affair >between x and y would most likely be over, is that not so( not about the > >affair )? I need to check out some info about those NSA's clusters. The >"mile" word really captivated my heart. > >In terms of the headers of a message. How necessary is to indicate that >a >particular message is encrypted? I can only suspect that hackers are the >only >people that benefit from this information. The only use I see is for >the >programmer to know when to pop up passphrase box or fetch a public key. >I >would also expect the actual encrypted message to be free of headers >because >that would identify the fact that it is encrypted or at least some kind >of >hint. > >Thanks for the explanation, who knows what I was thinking. > >Alvaro Zuniga > > >Date: >Today 10:28:42 am > > >How possible is for one of this messages to be decrypted? I have read >that GPG >encryption has yet to be broken. Is that an outdated fact? For what I >understand about brute force algorithms, in order to break one of this >messages, even with a small 8 character passphrase and say a 1024 bit >encryption cipher, could take quit a bit of time. I am sure the numbers >I >have are quite outdated due to the hardware improvement, clustering, >etc. >since the time I took a lecture on this subject; however, this number >should >fall at least on the years category, in which case the illicit love >affair >between x and y would most likely be over, is that not so( not about the > >affair )? I need to check out some info about those NSA's clusters. The >"mile" word really captivated my heart. > >In terms of the headers of a message. How necessary is to indicate that >a >particular message is encrypted? I can only suspect that hackers are the >only >people that benefit from this information. The only use I see is for >the >programmer to know when to pop up passphrase box or fetch a public key. >I >would also expect the actual encrypted message to be free of headers >because >that would identify the fact that it is encrypted or at least some kind >of >hint. > >Thanks for the explanation, who knows what I was thinking. > >Alvaro Zuniga > >On Tuesday 17 June 2003 11:06 pm, will hill wrote: > > On 2003.06.17 20:23 John Hebert wrote: > > > I think he meant that something like Carnivore could easily pick up >the > > > fact that only one out of ~100 messages were encrypted by parsing >the > > > message headers, and then somehow note that fact, or start a brute >force > > > decryption of it on the square miles of the NSA's underground server > > > clusters. > > > > That's about it. Sometimes, the fact that you have something to tell > > someone is more important than what you say. A sudden burst of >encrypted > > messages between JD Edwards and Peoplesoft might spark Lary's >interest. > > > > _______________________________________________ > > General mailing list > > [email protected] > > http://brlug.net/mailman/listinfo/general_brlug.net > >_______________________________________________ >General mailing list >[email protected] >http://brlug.net/mailman/listinfo/general_brlug.net > >_______________________________________________ >General mailing list >[email protected] >http://brlug.net/mailman/listinfo/general_brlug.net > >_______________________________________________ >General mailing list >[email protected] >http://brlug.net/mailman/listinfo/general_brlug.net --- Dustin Puryear <[EMAIL PROTECTED]> Puryear Information Technology Windows, UNIX, and IT Consulting http://www.puryear-it.com
