Home |
Search |
Today's Posts |
#31
![]() |
|||
|
|||
![]()
L'acrobat wrote:
"R. Steve Walz" wrote in message ... L'acrobat wrote: "R. Steve Walz" wrote in message ... L'acrobat wrote: "phil hunt" wrote in message . .. transmissions still very clear), and the use of FH combined with crypto key makes it darned near impossible for the bad guy to decypher it in any realistic timely manner. Modern crypto is good enough to withstand all cryptanalytic attacks. Thank you Admiral Doenitz... ------------ He's right. Major breaththrough of all possible barriers, the RSA algorithm. Uncrackable in the lifetime of the serious user, and crack is entirely predictable with improved computing power and can be lengthened to compensate. The fact that you and I think it is unbeatable, doesn't mean it is. "lifetime of the serious user" what ********, you and I have absolutely no idea what sort of tech/processing power will be available 10 years from now, let alone 30. ----------------- Nothing CAN magically guess extraordinarily long primes. That will never just magically become possible. This intrinsic truth resides in the very mathematics itself, a fact outside of time and progress, and not in any technology of any kind. "and crack is entirely predictable with improved computing power" of course it is... Ask the good Admiral how confident he was that his system was secure. ---------------------- Irrelevant. His system relied on technology, as any mathematician could have told him. He merely held his nose and trusted the allies weren't technically advanced enough to do it quick enough. He lost. But the "bet" that RSA makes is totally different, in that it relies statistically upon the ABSOLUTE RANDOM unlikelihood of any absolute guessing of very large prime numbers by machines whose rate of guessing is limited and well-known as their intrinsic limit. This number is a VERY VERY VERY large prime number. In case you don't quite get it, the most used high security prime number size is greater than the number of atoms in the entire big-bang universe AND greater than even THAT by an even GREATER multiplier! See the writings of James Bidzos, CEO of RSA Tech. for these revelations. Damn near as confident as you are and that worked out so well, didn't it? ------------------------ You have absolutely NO IDEA what the **** you're talking about. See Mr Schoenes response. It seems that you sir, have no idea what the **** you are talking about. ------------------- You're a lying **** and a bounder, and you're diddling yourself and delaying the inevitable. Again, ask the Good Admiral D how confident he was that his system was safe. ---------------- You're blathering, hoping that line will sustain you while you try to bluster your way out of this, when the fact is that RSA is qualitatively different than any systematically crackable cipher. -Steve -- -Steve Walz ftp://ftp.armory.com/pub/user/rstevew Electronics Site!! 1000's of Files and Dirs!! With Schematics Galore!! http://www.armory.com/~rstevew or http://www.armory.com/~rstevew/Public |
#32
![]() |
|||
|
|||
![]()
L'acrobat wrote:
"R. Steve Walz" wrote in message ... L'acrobat wrote: "R. Steve Walz" wrote in message ... L'acrobat wrote: "phil hunt" wrote in message . .. transmissions still very clear), and the use of FH combined with crypto key makes it darned near impossible for the bad guy to decypher it in any realistic timely manner. Modern crypto is good enough to withstand all cryptanalytic attacks. Thank you Admiral Doenitz... ------------ He's right. Major breaththrough of all possible barriers, the RSA algorithm. Uncrackable in the lifetime of the serious user, and crack is entirely predictable with improved computing power and can be lengthened to compensate. The fact that you and I think it is unbeatable, doesn't mean it is. "lifetime of the serious user" what ********, you and I have absolutely no idea what sort of tech/processing power will be available 10 years from now, let alone 30. ----------------- Nothing CAN magically guess extraordinarily long primes. That will never just magically become possible. This intrinsic truth resides in the very mathematics itself, a fact outside of time and progress, and not in any technology of any kind. "and crack is entirely predictable with improved computing power" of course it is... Ask the good Admiral how confident he was that his system was secure. ---------------------- Irrelevant. His system relied on technology, as any mathematician could have told him. He merely held his nose and trusted the allies weren't technically advanced enough to do it quick enough. He lost. But the "bet" that RSA makes is totally different, in that it relies statistically upon the ABSOLUTE RANDOM unlikelihood of any absolute guessing of very large prime numbers by machines whose rate of guessing is limited and well-known as their intrinsic limit. This number is a VERY VERY VERY large prime number. In case you don't quite get it, the most used high security prime number size is greater than the number of atoms in the entire big-bang universe AND greater than even THAT by an even GREATER multiplier! See the writings of James Bidzos, CEO of RSA Tech. for these revelations. Damn near as confident as you are and that worked out so well, didn't it? ------------------------ You have absolutely NO IDEA what the **** you're talking about. See Mr Schoenes response. It seems that you sir, have no idea what the **** you are talking about. ------------------- You're a lying **** and a bounder, and you're diddling yourself and delaying the inevitable. Again, ask the Good Admiral D how confident he was that his system was safe. ---------------- You're blathering, hoping that line will sustain you while you try to bluster your way out of this, when the fact is that RSA is qualitatively different than any systematically crackable cipher. -Steve -- -Steve Walz ftp://ftp.armory.com/pub/user/rstevew Electronics Site!! 1000's of Files and Dirs!! With Schematics Galore!! http://www.armory.com/~rstevew or http://www.armory.com/~rstevew/Public |
#33
![]() |
|||
|
|||
![]() "R. Steve Walz" wrote in message ... L'acrobat wrote: "R. Steve Walz" wrote in message ... L'acrobat wrote: "R. Steve Walz" wrote in message ... L'acrobat wrote: "phil hunt" wrote in message . .. transmissions still very clear), and the use of FH combined with crypto key makes it darned near impossible for the bad guy to decypher it in any realistic timely manner. Modern crypto is good enough to withstand all cryptanalytic attacks. Thank you Admiral Doenitz... ------------ He's right. Major breaththrough of all possible barriers, the RSA algorithm. Uncrackable in the lifetime of the serious user, and crack is entirely predictable with improved computing power and can be lengthened to compensate. The fact that you and I think it is unbeatable, doesn't mean it is. "lifetime of the serious user" what ********, you and I have absolutely no idea what sort of tech/processing power will be available 10 years from now, let alone 30. ----------------- Nothing CAN magically guess extraordinarily long primes. That will never just magically become possible. This intrinsic truth resides in the very mathematics itself, a fact outside of time and progress, and not in any technology of any kind. "and crack is entirely predictable with improved computing power" of course it is... Ask the good Admiral how confident he was that his system was secure. ---------------------- Irrelevant. His system relied on technology, as any mathematician could have told him. He merely held his nose and trusted the allies weren't technically advanced enough to do it quick enough. He lost. But the "bet" that RSA makes is totally different, in that it relies statistically upon the ABSOLUTE RANDOM unlikelihood of any absolute guessing of very large prime numbers by machines whose rate of guessing is limited and well-known as their intrinsic limit. This number is a VERY VERY VERY large prime number. In case you don't quite get it, the most used high security prime number size is greater than the number of atoms in the entire big-bang universe AND greater than even THAT by an even GREATER multiplier! See the writings of James Bidzos, CEO of RSA Tech. for these revelations. Damn near as confident as you are and that worked out so well, didn't it? ------------------------ You have absolutely NO IDEA what the **** you're talking about. See Mr Schoenes response. It seems that you sir, have no idea what the **** you are talking about. ------------------- You're a lying **** and a bounder, and you're diddling yourself and delaying the inevitable. Not trying to argue your already discredited position anymore Stevie? Only an idiot would suggest that any code is "Uncrackable in the lifetime of the serious user" ands so you did. Again, ask the Good Admiral D how confident he was that his system was safe. ---------------- You're blathering, hoping that line will sustain you while you try to bluster your way out of this, when the fact is that RSA is qualitatively different than any systematically crackable cipher. As has already been shown, RSA isn't uncrackable, but you are. What, exactly do you think the NSA is doing with all those 'puters they own? playing Doom? Of course RSA is uncrackable, just like the good Admirals systems and I assume he had a lackwitted buffoon just like you telling him that there was no way anyone could be decrypting our stuff too... |
#34
![]() |
|||
|
|||
![]() "R. Steve Walz" wrote in message ... L'acrobat wrote: "R. Steve Walz" wrote in message ... L'acrobat wrote: "R. Steve Walz" wrote in message ... L'acrobat wrote: "phil hunt" wrote in message . .. transmissions still very clear), and the use of FH combined with crypto key makes it darned near impossible for the bad guy to decypher it in any realistic timely manner. Modern crypto is good enough to withstand all cryptanalytic attacks. Thank you Admiral Doenitz... ------------ He's right. Major breaththrough of all possible barriers, the RSA algorithm. Uncrackable in the lifetime of the serious user, and crack is entirely predictable with improved computing power and can be lengthened to compensate. The fact that you and I think it is unbeatable, doesn't mean it is. "lifetime of the serious user" what ********, you and I have absolutely no idea what sort of tech/processing power will be available 10 years from now, let alone 30. ----------------- Nothing CAN magically guess extraordinarily long primes. That will never just magically become possible. This intrinsic truth resides in the very mathematics itself, a fact outside of time and progress, and not in any technology of any kind. "and crack is entirely predictable with improved computing power" of course it is... Ask the good Admiral how confident he was that his system was secure. ---------------------- Irrelevant. His system relied on technology, as any mathematician could have told him. He merely held his nose and trusted the allies weren't technically advanced enough to do it quick enough. He lost. But the "bet" that RSA makes is totally different, in that it relies statistically upon the ABSOLUTE RANDOM unlikelihood of any absolute guessing of very large prime numbers by machines whose rate of guessing is limited and well-known as their intrinsic limit. This number is a VERY VERY VERY large prime number. In case you don't quite get it, the most used high security prime number size is greater than the number of atoms in the entire big-bang universe AND greater than even THAT by an even GREATER multiplier! See the writings of James Bidzos, CEO of RSA Tech. for these revelations. Damn near as confident as you are and that worked out so well, didn't it? ------------------------ You have absolutely NO IDEA what the **** you're talking about. See Mr Schoenes response. It seems that you sir, have no idea what the **** you are talking about. ------------------- You're a lying **** and a bounder, and you're diddling yourself and delaying the inevitable. Not trying to argue your already discredited position anymore Stevie? Only an idiot would suggest that any code is "Uncrackable in the lifetime of the serious user" ands so you did. Again, ask the Good Admiral D how confident he was that his system was safe. ---------------- You're blathering, hoping that line will sustain you while you try to bluster your way out of this, when the fact is that RSA is qualitatively different than any systematically crackable cipher. As has already been shown, RSA isn't uncrackable, but you are. What, exactly do you think the NSA is doing with all those 'puters they own? playing Doom? Of course RSA is uncrackable, just like the good Admirals systems and I assume he had a lackwitted buffoon just like you telling him that there was no way anyone could be decrypting our stuff too... |
#35
![]() |
|||
|
|||
![]()
L'acrobat wrote:
"R. Steve Walz" wrote in message ... Thank you Admiral Doenitz... ------------ He's right. Major breaththrough of all possible barriers, the RSA algorithm. Uncrackable in the lifetime of the serious user, and crack is entirely predictable with improved computing power and can be lengthened to compensate. The fact that you and I think it is unbeatable, doesn't mean it is. "lifetime of the serious user" what ********, you and I have absolutely no idea what sort of tech/processing power will be available 10 years from now, let alone 30. ----------------- Nothing CAN magically guess extraordinarily long primes. That will never just magically become possible. This intrinsic truth resides in the very mathematics itself, a fact outside of time and progress, and not in any technology of any kind. "and crack is entirely predictable with improved computing power" of course it is... Ask the good Admiral how confident he was that his system was secure. ---------------------- Irrelevant. His system relied on technology, as any mathematician could have told him. He merely held his nose and trusted the allies weren't technically advanced enough to do it quick enough. He lost. But the "bet" that RSA makes is totally different, in that it relies statistically upon the ABSOLUTE RANDOM unlikelihood of any absolute guessing of very large prime numbers by machines whose rate of guessing is limited and well-known as their intrinsic limit. This number is a VERY VERY VERY large prime number. In case you don't quite get it, the most used high security prime number size is greater than the number of atoms in the entire big-bang universe AND greater than even THAT by an even GREATER multiplier! See the writings of James Bidzos, CEO of RSA Tech. for these revelations. Damn near as confident as you are and that worked out so well, didn't it? ------------------------ You have absolutely NO IDEA what the **** you're talking about. See Mr Schoenes response. It seems that you sir, have no idea what the **** you are talking about. ------------------- You're a lying **** and a bounder, and you're diddling yourself and delaying the inevitable. Not trying to argue your already discredited position anymore Stevie? ----------------------- Ain't any such. Only an idiot would suggest that any code is "Uncrackable in the lifetime of the serious user" ands so you did. --------------------------- It *IS*! If you choose to try to crack RSA go to their site and download a test message and try it. None have done so above the known prime lengths that are do-able. Again, ask the Good Admiral D how confident he was that his system was safe. ---------------- You're blathering, hoping that line will sustain you while you try to bluster your way out of this, when the fact is that RSA is qualitatively different than any systematically crackable cipher. As has already been shown, RSA isn't uncrackable, ------------------- Which we knew, but it takes for ****ing ever statistically. It can easily be made to take longer than the current age of the universe. but you are. -------------------- More of your meaningless blather and ridiculous self-covering. What, exactly do you think the NSA is doing with all those 'puters they own? playing Doom? --------------------- Monitoring un-coded transmissions en masse hoping to flag trends or conspiracies by other characteristic signatures. But as for cracking RSA encoded messages or even kiddy porn being sent encoded from Europe: Not a whole ****ing hell of a lot anymore. They are hoping their hardware will frighten terrorists out of using commonly available public domain technology to completely defeat them, while knowing that everyone who knows anything knows they are totally defeated by any kid with a computer if he bothers to look it up and download the tools and use a long enough bit-length and a decent firewall properly installed. Of course RSA is uncrackable, just like the good Admirals systems and I assume he had a lackwitted buffoon just like you telling him that there was no way anyone could be decrypting our stuff too... --------------------------- That's irrelevant, because he would have simply been technically wrong out of his own ignorance of cryptology, whereas I am not. -Steve -- -Steve Walz ftp://ftp.armory.com/pub/user/rstevew Electronics Site!! 1000's of Files and Dirs!! With Schematics Galore!! http://www.armory.com/~rstevew or http://www.armory.com/~rstevew/Public |
#36
![]() |
|||
|
|||
![]()
L'acrobat wrote:
"R. Steve Walz" wrote in message ... Thank you Admiral Doenitz... ------------ He's right. Major breaththrough of all possible barriers, the RSA algorithm. Uncrackable in the lifetime of the serious user, and crack is entirely predictable with improved computing power and can be lengthened to compensate. The fact that you and I think it is unbeatable, doesn't mean it is. "lifetime of the serious user" what ********, you and I have absolutely no idea what sort of tech/processing power will be available 10 years from now, let alone 30. ----------------- Nothing CAN magically guess extraordinarily long primes. That will never just magically become possible. This intrinsic truth resides in the very mathematics itself, a fact outside of time and progress, and not in any technology of any kind. "and crack is entirely predictable with improved computing power" of course it is... Ask the good Admiral how confident he was that his system was secure. ---------------------- Irrelevant. His system relied on technology, as any mathematician could have told him. He merely held his nose and trusted the allies weren't technically advanced enough to do it quick enough. He lost. But the "bet" that RSA makes is totally different, in that it relies statistically upon the ABSOLUTE RANDOM unlikelihood of any absolute guessing of very large prime numbers by machines whose rate of guessing is limited and well-known as their intrinsic limit. This number is a VERY VERY VERY large prime number. In case you don't quite get it, the most used high security prime number size is greater than the number of atoms in the entire big-bang universe AND greater than even THAT by an even GREATER multiplier! See the writings of James Bidzos, CEO of RSA Tech. for these revelations. Damn near as confident as you are and that worked out so well, didn't it? ------------------------ You have absolutely NO IDEA what the **** you're talking about. See Mr Schoenes response. It seems that you sir, have no idea what the **** you are talking about. ------------------- You're a lying **** and a bounder, and you're diddling yourself and delaying the inevitable. Not trying to argue your already discredited position anymore Stevie? ----------------------- Ain't any such. Only an idiot would suggest that any code is "Uncrackable in the lifetime of the serious user" ands so you did. --------------------------- It *IS*! If you choose to try to crack RSA go to their site and download a test message and try it. None have done so above the known prime lengths that are do-able. Again, ask the Good Admiral D how confident he was that his system was safe. ---------------- You're blathering, hoping that line will sustain you while you try to bluster your way out of this, when the fact is that RSA is qualitatively different than any systematically crackable cipher. As has already been shown, RSA isn't uncrackable, ------------------- Which we knew, but it takes for ****ing ever statistically. It can easily be made to take longer than the current age of the universe. but you are. -------------------- More of your meaningless blather and ridiculous self-covering. What, exactly do you think the NSA is doing with all those 'puters they own? playing Doom? --------------------- Monitoring un-coded transmissions en masse hoping to flag trends or conspiracies by other characteristic signatures. But as for cracking RSA encoded messages or even kiddy porn being sent encoded from Europe: Not a whole ****ing hell of a lot anymore. They are hoping their hardware will frighten terrorists out of using commonly available public domain technology to completely defeat them, while knowing that everyone who knows anything knows they are totally defeated by any kid with a computer if he bothers to look it up and download the tools and use a long enough bit-length and a decent firewall properly installed. Of course RSA is uncrackable, just like the good Admirals systems and I assume he had a lackwitted buffoon just like you telling him that there was no way anyone could be decrypting our stuff too... --------------------------- That's irrelevant, because he would have simply been technically wrong out of his own ignorance of cryptology, whereas I am not. -Steve -- -Steve Walz ftp://ftp.armory.com/pub/user/rstevew Electronics Site!! 1000's of Files and Dirs!! With Schematics Galore!! http://www.armory.com/~rstevew or http://www.armory.com/~rstevew/Public |
#37
![]() |
|||
|
|||
![]()
On 25 Sep 2003 06:23:38 -0700, Kevin Brooks wrote:
(phil hunt) wrote in message ... On 23 Sep 2003 20:00:32 -0700, Kevin Brooks wrote: No. Paul is correct, DF'ing a "frequency agile" (or "hopping") transmitter is no easy task. For example, the standard US SINCGARS radio changes frequencies about one hundred times per *second*, Bear in mind that I'm talking about automated electronic gear here, not manual intervention. Electronics works in time spans a lot quicker than 10 ms. So what? Unless you know the frequency hopping plan ahead of time (something that is rather closely guarded), you can't capture enough of the transmission to do you any good--they use a rather broad spectrum. OK, I now understand that DF generally relies on knowing the frequency in advance. BTW, when you say a rather broad spectrum, how broad? And divided into how many bands, roughly? It uses the entire normal military VHF FM spectrum, 30-88 MHz. ISTR that the steps in between are measured in 1 KHz increments, as opposed to the old 10 KHz increments found in older FM radios like the AN/VRC-12 family, so the number of different frequencies SINGCARS can use is 58,000. More than one 1 kHz slot is likely to be in use at anyone time, since you need enough bandwidth for voice. Say 20, then about 1/3000th of the frequency space is in use at any one time. Modern crypto is good enough to withstand all cryptanalytic attacks. Only if it were so...but thank goodness it is not. Oh? So who can break AES/Rijndael? Otherwise we would have lost the value of one of our largest and most valuable intel programs, and NSA would no longer exist. Even the cypher keys used by our modern tactical radios (said keys being generated by NSA at the top end, though we now have computers in the field capable of "key generation" using input from that source) are not unbreakable--instead, they are tough enough to break that we can be reasonably assured that the bad guys will not be able to gain any kind of *timely* tactical intel; enough computing power in the hands of the crypto-geeks and they can indeed break them, True, but "enough" happens to be more than all the computers in existance right now, or likely to exist. Assume: there are 1 billion computers, each of which can check 1 billion keys/second. Then a brute-force search on a 128-bit keyspace would take about 10^60 years. -- "It's easier to find people online who openly support the KKK than people who openly support the RIAA" -- comment on Wikipedia |
#38
![]() |
|||
|
|||
![]()
On 25 Sep 2003 06:23:38 -0700, Kevin Brooks wrote:
(phil hunt) wrote in message ... On 23 Sep 2003 20:00:32 -0700, Kevin Brooks wrote: No. Paul is correct, DF'ing a "frequency agile" (or "hopping") transmitter is no easy task. For example, the standard US SINCGARS radio changes frequencies about one hundred times per *second*, Bear in mind that I'm talking about automated electronic gear here, not manual intervention. Electronics works in time spans a lot quicker than 10 ms. So what? Unless you know the frequency hopping plan ahead of time (something that is rather closely guarded), you can't capture enough of the transmission to do you any good--they use a rather broad spectrum. OK, I now understand that DF generally relies on knowing the frequency in advance. BTW, when you say a rather broad spectrum, how broad? And divided into how many bands, roughly? It uses the entire normal military VHF FM spectrum, 30-88 MHz. ISTR that the steps in between are measured in 1 KHz increments, as opposed to the old 10 KHz increments found in older FM radios like the AN/VRC-12 family, so the number of different frequencies SINGCARS can use is 58,000. More than one 1 kHz slot is likely to be in use at anyone time, since you need enough bandwidth for voice. Say 20, then about 1/3000th of the frequency space is in use at any one time. Modern crypto is good enough to withstand all cryptanalytic attacks. Only if it were so...but thank goodness it is not. Oh? So who can break AES/Rijndael? Otherwise we would have lost the value of one of our largest and most valuable intel programs, and NSA would no longer exist. Even the cypher keys used by our modern tactical radios (said keys being generated by NSA at the top end, though we now have computers in the field capable of "key generation" using input from that source) are not unbreakable--instead, they are tough enough to break that we can be reasonably assured that the bad guys will not be able to gain any kind of *timely* tactical intel; enough computing power in the hands of the crypto-geeks and they can indeed break them, True, but "enough" happens to be more than all the computers in existance right now, or likely to exist. Assume: there are 1 billion computers, each of which can check 1 billion keys/second. Then a brute-force search on a 128-bit keyspace would take about 10^60 years. -- "It's easier to find people online who openly support the KKK than people who openly support the RIAA" -- comment on Wikipedia |
#39
![]() |
|||
|
|||
![]()
On Thu, 25 Sep 2003 13:51:14 +0000 (UTC), Mike Andrews wrote:
In (rec.radio.amateur.homebrew), phil hunt wrote: Modern crypto is good enough to withstand all cryptanalytic attacks. That's a great idea, and I suspect tthat you're right in the general case. But a modern cryptosystem, badly implemented, will have all manner of vulnerabilities -- most of which are not particularly obvious. Absolutely. Remember the competition for the successor to DES as the standard crypto algorithm? That was *quite* interesting. What was interesting about it? -- "It's easier to find people online who openly support the KKK than people who openly support the RIAA" -- comment on Wikipedia |
#40
![]() |
|||
|
|||
![]()
On Thu, 25 Sep 2003 13:51:14 +0000 (UTC), Mike Andrews wrote:
In (rec.radio.amateur.homebrew), phil hunt wrote: Modern crypto is good enough to withstand all cryptanalytic attacks. That's a great idea, and I suspect tthat you're right in the general case. But a modern cryptosystem, badly implemented, will have all manner of vulnerabilities -- most of which are not particularly obvious. Absolutely. Remember the competition for the successor to DES as the standard crypto algorithm? That was *quite* interesting. What was interesting about it? -- "It's easier to find people online who openly support the KKK than people who openly support the RIAA" -- comment on Wikipedia |
Reply |
Thread Tools | Search this Thread |
Display Modes | |
|
|
![]() |
||||
Thread | Forum | |||
Amateur Radio Newsline™ Report 1419  October 22, 2004 | Dx | |||
F6FBB to Internet email? | Digital | |||
F6FBB to Internet email? | Digital | |||
Internet trials and the European EMC directive | Equipment | |||
Internet trials and the European EMC directive | Equipment |