Re: Wikileaks video "crypto".
On Fri, Apr 9, 2010 at 13:06, Perry E. Metzger wrote: > The video was apparently intentionally given to Wikileaks, so one can't > imagine that the releasing parties would have wanted it to be unreadable > by them (or that any reasonable modern cryptosystem would have be > crackable). What, then, does the "decryption" claim mean here. Does > anyone know? > This site http://leaks.telecomix.org/ claims to have the original, unencrypted video. It appears to have been encrypted with OpenSSL given the Salted__ prefix. -- Thomas Coppi - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com
Re: [tahoe-dev] SHA-1 broken!
On Sun, May 3, 2009 at 4:35 PM, Christian Rechberger wrote: > The design of DES facilitates this kind of throughput/cost gains on FPGAs. > > Remember that the MD4 family (incl. SHA-1) was designed to be efficient on > 32-bit CPUs. For these hash functions, it is much harder to get a > throughput/cost gain on FPGAs compared to off-the-shelf CPUs. At least, this > was my conclusion when I quickly looked into this a few years ago. > The n...@home project(http://nsa.unaligned.org/) seems to do it pretty well. He even provides the optimized SHA-1 and MD5 Verilog code used. This only works because straight-up bruteforce requires little memory, though. If the new SHA-1 break requires significant memory usage I don't think something like the COPACOBANA can help. Regards, -- Thomas Coppi - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com
Re: Proof of Work -> atmospheric carbon
On Wed, Jan 28, 2009 at 2:19 PM, John Levine wrote: > Indeed. And don't forget that through the magic of botnets, the bad > guys have vastly more compute power available than the good guys. Just out of curiosity, does anyone happen to know of any documented examples of a botnet being used for something more interesting than just sending spam or DDoS? -- Thomas Coppi - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com