I am sorry to say. But it is bullshit wot you are saying..... 

I am quite sure that a 256 bit encryption can cracked (brute force way) by
the big players (US, MS, etc) within a reasonable time say 2 or 3 months! 

And yes you can buy computers or clusters for 100.000 $. And they are 100
more likely 1000 times as fast as a PII 266. But if you take a look at the
distributed.net project.
They are working for the past 4 years to hack (bruteforce) the rc5-64. The
distributed.net combined power is 90.427 MKeys/sec  (that are 17.000 Athlon
1400 PC). This is an average the current power is 196.231 MKeys/sec (36.720
Atlon 1400). And keep in mind that distributed.net project is a bruteforce
attempt on 64 Bit encryption!

So is a 256 bit encryption safe?
Yes. and No.
Yes: it is quite safe for a bruteforce attempt, it will take about 30 years
for distributed.net.
No: Most "secure" encryption methods have sort cuts to hack the code,
atleast for DES, Blowfish and several other popular encryption methods. 

So what should we use?
Banking companies demand a 128 bit encryption (in the Netherlands, other
countries don't know). For my CMS I am satisfied with an 40 bit encryption.
It is a matter of a risk/cost evalution. How much risk is there and if an
anomaly occurs how much does it cost me? 

My advise always use atleast 40(128 is better :) ) bit SSL3 encryption,
because SSL2 and lower have some bugs which make it possible to steal a
session between users and server. 

Jerry


-----Original Message-----
From: TD - Sales International Holland B.V. [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 21, 2001 7:05 PM
To: Jon Farmer; [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: [PHP] PHP / SSL


On Thursday 20 December 2001 15:37, Jon Farmer stuffed this into my mailbox:

256 bit encryption should be crackable by not too much more people than 
Microsoft, the US government, China and perhaps some others with shitloads
of 
money that CAN dissapear (within reasonable time). Else there will be 
questions. Personally I found it hard to believe as well. But I'm told that 
you can have the same power for like $ 100.000,- by buying the best 
price/performance now. Make no mistake, those machines only need a
mainboard, 
cpu, cooler, powersupply and a network card. Even better, we're thinking 
about x86 hardware (you and me) be appearantly there is hardware on the 
market that was specifically crafted to decrypt stuff brute force. One of 
those would probably match like a 100 or maybe even a 1000 of the P-II 266 
distributed.net has. Now if you're sure you can make $ 200.000,- by the 
credit card numbers/other info you gain from cracking it, it is already
worth 
the effort.

Btw, an Athlon 1400 does 5,3 MKeys per SECOND (RC5-64)!! and those are damn 
cheap.......

> > I urge you strongly to advise against that. Although it might be
possible
>
> to
>
> > downgrade your encryption to 40bit I'd like to make you aware of the
fact
> > that DES which is 56 bit encryption if I'm not mistaken was cracked
>
> several
>
> > times by brute force in UNDER 22 hours by the distributed.net people
> > (www.distributed.net). Therefore I would NOT consider 40 bits encryption
>
> safe
>
> > and I feel obligated to make you aware of that. You are warned now :-)
so
>
> do
>
> > as you please.
>
> Erm, yeah true.... but by their own admission they used the equivalant of
> 160000 PII 266Mhz machines to accomplish this. If you think someone is
> going to want your data and has those kinda resources available then yeah
> go for higher. However if thats your worry where are you going to stop in
> the length of your key? If your that paranoid then it shouldn't be using
> public networks in the first place!!

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]


The information contained in this email is confidential and
may be legally privileged. It is intended solely for the 
addressee. Access to this email by anyone else is 
unauthorized. If you are not the intended recipient, any 
form of disclosure, production, distribution or any action 
taken or refrained from in reliance on it, is prohibited and 
may be unlawful. Please notify the sender immediately.

The content of the email is not legally binding unless 
confirmed by letter bearing two authorized signatures.

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]

Reply via email to