Re: [Enigmail] Video of my privacy enigmail talk at NDC conference available

2014-06-11 Thread Phil Stracchino
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 06/10/14 22:04, afreewoman wrote: Errr...that's not the first time I've done that! The center is real - did you search for it? The center exists, indeed. That's about the point at which reality and the nsa.gov1.info parody article part

Re: [Enigmail] Video of my privacy enigmail talk at NDC conference available

2014-06-11 Thread Robert J. Hansen
While I agree with Phil, there's one thing here which perhaps could use some clarification: of physics and information theory for believing that not only is it computationally infeasible now for us to mount any kind of realistic attack upon SHA512, but it will forever remain computationally

Re: [Enigmail] Video of my privacy enigmail talk at NDC conference available

2014-06-11 Thread Robert J. Hansen
As for SHA512 being under threat? That is simply ludicrous. As a quick Fermi estimate -- Brute-forcing a preimage collision in SHA-512 takes 10**153 operations (2**511). Each attempt requires erasing 1024 bits of information (512 bits of input buffer and 512 of output buffer). That's

Re: [Enigmail] Video of my privacy enigmail talk at NDC conference available

2014-06-11 Thread John Clizbe
Robert J. Hansen wrote: afreewoman wrote: to the task of protecting activists. If the NSA can break 1024 bit encryption, they have almost certainly already hacked SHA512. Breaking RSA-1024 is considered equivalent to an attack of complexity 2**80. That's *a lot*. A few years ago a