Well your credibility is just shot to hell now.

At 11:37 AM 6/18/2003 -0500, you wrote:

>That should be spelled "Krell's". Sorry for my faux pas.
>
>John Hebert
>
>-----Original Message-----
>From: John Hebert
>To: '[email protected] '
>Sent: 6/18/03 11:29 AM
>Subject: NSA's decryption clusters vs GPG, et.al. was RE: GPG does not pro
>vide "end to end encryption", but only mail c onte nt encryption was RE:
>[brlug-general] Cox and smtp pain today.
>
>Well Alvaro, if you really insist we discuss this on a public list, then
>I
>first must give a shout out to the ECHELON homeys: Howdy!
>
>GPG has yet to broken, as far as is publicly known. However, you admit
>yourself that the estimates for brute force attack are outdated.
>
>Just what do you think the DOD did with all of those old Cold War
>bunkers
>around DC? They filled em full of blade stuffed racks running Linux
>clusters
>and put em to work in parallel doing brute force decryption. They were
>gonna
>upgrade to OpenBSD but they found out Theo de Raadt is a commie.
>
>Let's do some math:
>
>Let's say it takes 1 computer 1,000,000 years to brute force message A.
>Then, theoretically, it will take 2 computers half that time: 500,000
>years.
>3 computers: 333,333 years, ... and so on.
>
>Eventually, it comes down to this: 1 billion computers working in
>parallel
>will decrypt message A in .365 of a day, about 8 hours. And 10 billion
>computers will decrypt message A in less than an hour. And 100 billion
>computers will decrypt the message before you actually ask the computers
>to
>do so.
>
>Now, I know you are an intelligent individual, but do you really think
>that
>the DOD was paying $600 for a hammer since WWII? No. The DOD paid the
>normal
>$23 for a contractor supplied hammer, and put the rest into a long term
>black ops IT project in coordination with the defense contractors and
>built
>up the NSA's toy room into an IT infrastructure that would make the
>Krells's
>underground labs in "Forbidden Planet" look like the work of
>brain-damaged
>infants.
>
>Don't even get me started on their time-space travel machines.
>
>:)
>
>John Hebert
>
>-----Original Message-----
>From: Alvaro Zuniga
>To: [email protected]
>Sent: 6/18/03 10:54 AM
>Subject: Re: GPG does not provide "end to end encryption", but only mail
>c
>onte nt encryption was RE: [brlug-general] Cox and smtp pain today.
>
>Thanks John:
>
>How possible is for one of this messages to be decrypted? I have read
>that GPG
>encryption has yet to be broken. Is that an outdated fact? For what I
>understand about brute force algorithms, in order to break one of this
>messages, even with a small 8 character passphrase and say a 1024 bit
>encryption cipher, could take quit a bit of time. I am sure the numbers
>I
>have are quite outdated due to the hardware improvement, clustering,
>etc.
>since the time I took a lecture on this subject; however, this number
>should
>fall at least on the years category, in which case the illicit love
>affair
>between x and y would most likely be over, is that not so( not about the
>
>affair )? I need to check out some info about those NSA's clusters. The
>"mile" word really captivated my heart.
>
>In terms of the headers of a message. How necessary is to indicate that
>a
>particular message is encrypted? I can only suspect that hackers are the
>only
>people that benefit from this information.  The only use I see is for
>the
>programmer to know when to pop up passphrase box or fetch a public key.
>I
>would also expect the actual encrypted message to be free of headers
>because
>that would identify the fact that it is encrypted or at least some kind
>of
>hint.
>
>Thanks for the explanation, who knows what I was thinking.
>
>Alvaro Zuniga
>
>
>Date:
>Today 10:28:42 am
>
>
>How possible is for one of this messages to be decrypted? I have read
>that GPG
>encryption has yet to be broken. Is that an outdated fact? For what I
>understand about brute force algorithms, in order to break one of this
>messages, even with a small 8 character passphrase and say a 1024 bit
>encryption cipher, could take quit a bit of time. I am sure the numbers
>I
>have are quite outdated due to the hardware improvement, clustering,
>etc.
>since the time I took a lecture on this subject; however, this number
>should
>fall at least on the years category, in which case the illicit love
>affair
>between x and y would most likely be over, is that not so( not about the
>
>affair )? I need to check out some info about those NSA's clusters. The
>"mile" word really captivated my heart.
>
>In terms of the headers of a message. How necessary is to indicate that
>a
>particular message is encrypted? I can only suspect that hackers are the
>only
>people that benefit from this information.  The only use I see is for
>the
>programmer to know when to pop up passphrase box or fetch a public key.
>I
>would also expect the actual encrypted message to be free of headers
>because
>that would identify the fact that it is encrypted or at least some kind
>of
>hint.
>
>Thanks for the explanation, who knows what I was thinking.
>
>Alvaro Zuniga
>
>On Tuesday 17 June 2003 11:06 pm, will hill wrote:
> > On 2003.06.17 20:23 John Hebert wrote:
> > > I think he meant that something like Carnivore could easily pick up
>the
> > > fact that only one out of ~100 messages were encrypted by parsing
>the
> > > message headers, and then somehow note that fact, or start a brute
>force
> > > decryption of it on the square miles of the NSA's underground server
> > > clusters.
> >
> > That's about it.  Sometimes, the fact that you have something to tell
> > someone is more important than what you say.  A sudden burst of
>encrypted
> > messages between JD Edwards and Peoplesoft might spark Lary's
>interest.
> >
> > _______________________________________________
> > General mailing list
> > [email protected]
> > http://brlug.net/mailman/listinfo/general_brlug.net
>
>_______________________________________________
>General mailing list
>[email protected]
>http://brlug.net/mailman/listinfo/general_brlug.net
>
>_______________________________________________
>General mailing list
>[email protected]
>http://brlug.net/mailman/listinfo/general_brlug.net
>
>_______________________________________________
>General mailing list
>[email protected]
>http://brlug.net/mailman/listinfo/general_brlug.net


---
Dustin Puryear <[EMAIL PROTECTED]>
Puryear Information Technology
Windows, UNIX, and IT Consulting
http://www.puryear-it.com


Reply via email to