You are not logged in. Login Now
 0-24   25-38         
 
Author Message
14 new of 38 responses total.
raven
response 25 of 38: Mark Unseen   Oct 5 20:03 UTC 2000

Depends on the length of the key I think a 2048 bit length key is pretty
safe (SRW can you confirm this or MDW?) but shorter keys are crackable in
realistic amounts of time.
manthac
response 26 of 38: Mark Unseen   Dec 29 18:23 UTC 2000

I do not have to worry about the nsa cracking a pgp message I use virtual
matrix encryption 1 million bit keys
drdoom
response 27 of 38: Mark Unseen   Dec 31 02:09 UTC 2000

ok...first of all i want to say for all of yo (smart) hackers and phreakers
out there on this BBS it is very stupid to tell about recent hacks you have
made..i mean in detail..noone cares (except for the FBI) that you decrypted
some passwords at so-and-so..i mean...ive had my share of hacks that are so
good you want to brag and boast but..feds do read BBS's ya know...
sifer
response 28 of 38: Mark Unseen   Jan 6 22:47 UTC 2001

what is virtual matrix encryption can u email me with some more information?
raven
response 29 of 38: Mark Unseen   Jan 6 23:59 UTC 2001

re #28 a bunch of bs don't believe the hype. If you really want to learn
about servers and networked computers get a copy of Linux or BSD for
ylour Windoze bix and be prepared for the steep learning curve.  There
is no easy way to learn sys admin.
daryl
response 30 of 38: Mark Unseen   Apr 21 19:32 UTC 2001

The last official crack of a RSA encryption was a RSA-512 (bits) message
cracked in about 15 days in 1000 workstations using the general number field
sieve (GNFS) algorithm. It took 8000 MIPS-years. I think this should give an
idea about what NSA can do with (nearly) unlimited computation resources and
(perhaps) better algorithms than GNFS. By the way, if they can develop a
funtional quantum computer they should trivially break _any_ message encrypted
with RSA or Diffie-Hellman. I think making a good quantum computer is a matter
of sciencie-fictiona today, however.

skeptik
response 31 of 38: Mark Unseen   Oct 15 19:56 UTC 2001

Some thoughts:  The ability to brute force PGP encrypted messages 
would depend not only on computational power, but also on the length
of the PGP keys involved.  A message encrypted with 1024 bit keys
would probably take a lot less time than one encrypted with 4048bits.

Someone mentioned that the NSA budget would be soaked up by such
a purchase.  While this is possibly true, we don't know whether 
intelligence organizations like the NSA have revenue streams other
than what they get from the federal government.  It sounds a bit
"Hollywood" to assume that they run businesses, etc, but it wouldn't
surprise me if they had multiple revenue streams whose profitability
exceeds what the government gives them.

danny
response 32 of 38: Mark Unseen   Mar 1 08:38 UTC 2004

This topic looks like its almost dead, but heh in regards to 21 cray not being
out of buisness thats true, they have just finished building a new one for
sandria weapons testing labs. Built using AMD opertron chips from what ive
been reading. As far as PGP is conserned of course they can break it, its
commercial cryptography and as such they wouldnt give it away to everyone for
free unless they had a way round it. As it stores the keys to the encryption
in a local keypair on the machine I would imagine it wouldnt take much to
reverse engineer the software to decrypt documents with the owners own cypto
keyring (keypair).
zyraf
response 33 of 38: Mark Unseen   Jul 1 14:41 UTC 2004

its possible to break 512bit RSA key, DES is also not good, only PGP looks
better, but is there any other safe encoding system? and software that will
let me encode file or floppy?.
foxworth
response 34 of 38: Mark Unseen   Jul 1 18:15 UTC 2004

First off, why encrypt?  If They want to see something, they will.  If you
don't encrypt, but instead spread the information you are protecting, they
will never be able to do anything about it.  Data is destroyed, but you can't
erase the human memory.  Of course, there ARE -some- exeptions to this. 
Second, if you insist on encrypting, go to www.lavarnd.org.  the best basis
is the white noise created by a webcam with the lenscap on.
zyraf
response 35 of 38: Mark Unseen   Jul 30 14:18 UTC 2004

i have some data that should be encrypted, and can't be putted on some serwer
unencrypted, they are just for my use. so how can i encrypt a floppy or files
in it?
second problem is where to put the key. if its on my computer, it isnt safe
and i dont want to have my friends addresses and/or telephone numbers not
encrypted. 
any open source software?
maus
response 36 of 38: Mark Unseen   May 7 00:44 UTC 2007

resp:35

http://www.afn.org/~afn21533/tinyaes.zip
ftp://ftp.sac.sk/sac/security/tinyfish.zip
ftp://ftp.demon.co.uk/pub/mirrors/garbo/pc/crypt/idea3a.zip

These are easy to use, run in DOS or Windows and implement well-known,
well-tested ciphers. The codes are written in Intel Assembly language,
so verifying them will be painful, but if you trust the author and the
webpage, then that is a non-issue (just use the prebuilt exe files). The
enciphered file is indistinguishable from noise. 

You can read a little blurb about these at
http://home.att.net/~short.stop/freesoft/encrypt.htm

The ciphers themselves are described at: 

http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
http://en.wikipedia.org/wiki/Blowfish_%28cipher%29
http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm

I recommend that you read Bruce Schneir's classic work, as well as the
novel _Cryptonomicon_. 

maus
response 37 of 38: Mark Unseen   May 7 00:51 UTC 2007

http://www.afn.org/~afn21533/rgdprogs.htm   <=== Interesting brief
descriptions of ciphers and implementations of them (typicallly in C or
Intel assembler)
zyraf
response 38 of 38: Mark Unseen   Jul 17 03:54 UTC 2007

hi
Thanks, this looks interesting.
I am wondering what can be done to make these things more easy to use: it
should be not a problem to integrate pgp and mail client, but what to do when
you want to encrypt some local files or a partition? This would be done to
make it unreadable when someone gets the computer (and in some case,
unauthorized person would also get anything thats near computer, and/or the
owner). Where to keep the key? It will no longer be a password, more like some
random stuff, not something possible to remember and write from keyboard all
the time. Where to keep the encrypted data? What do you think is the safest
scenario, and also pretty easy to implement? Having a pendrive with encrypted
filesystem where files would be kept and modified would be good, no need to
copy from safe place, decrypt, use/modify, crypt, store and get rid of
anything that is left on hard drive. 
btw You seem to be the only one (?) active here now
 0-24   25-38         
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss