(Continued - message length limit)
(which sucks)
(and is too small...)
[Martin]
> However, since encryption is typically based on large primes and
> factoring them together,
Odd. This statement is really wrong...
> Of course, storage
> isn't keeping up with Moore, so that does tend to slow things down a
> bit,
Whereas this one is quite incisive.
Only one class of encryption (Public Key) is based on messing about with
large primes ('factoring' them is really easy - I have an O(n) algorithm, if
you're interested ;). I know of no symmetric ciphers that have anything to
do with large primes or factoring.
Your storage comment is really clueful. Many of the better than brute force
attacks that cryptographers or mathematicians dream up involve vast amounts
of storage, for pre-computed data. As an example, unix passwords are
trivially attacked by having a dictionary of hashed english words in O(n)
(very good time, requires storage). That's why they "salt" the word before
they hash it - to make it harder to mount this attack - you'd need to have
one copy of the dictionary per salt (which is many). The space requirements
for some of the attacks against AES with reduced rounds, for example, were
Just Silly.
[Rick]
> However, to my knowledge your
> government in conjunction with IBM has allready made a quantum computer
with
> 4 atoms, and the swiss have one with 11, at the last count. They work via
> utilising quantum theory to perform calculations. The upshot of this is
that
> any calculation, no matter how large, is carried out
instantanesously......
This is a very common misconception about quantum computing. Shor's
algorithm is proved to be able to reduce the factoring problem from
exponential time to polynomial time. Poly time does NOT equal instant
success. The comparision I tend to go with is that we can expect RSA style
keys to be worth about half their "weight" - 4096 -> 2048 in terms of
"difficulty". I'm afraid that I have no academic reference for this
assertion, however.
And finally....
[Larry again]
> Actually there IS sort of a hole in MS Products (NT) concerning an NSA
> crypto key placed there BY Microsoft FOR the NSA.(documented) I believe
Ben
> N. or Bernd E. has more info on that. Or is anyone else familiar with
that?
Assuming that I'm Ben N, please don't drag my name into THAT sorry bucket or
rumour and innuendo. I did enough research into that issue to convince
myself that it's bunk (but I've never been a huge fan of NSA conspiracy
theories). The NSA Key is used so that the NSA can insert their own
classified crypto into Windows. This is important, because certain levels of
data in the US cannot be protected by non-classified algorithms. End of
story.
Anyway, I'd better not go on - the message length troll will catch and eat
me.
Cheers,
--
Ben Nagy
Marconi Services
Network Integration Specialist
Mb: +61 414 411 520 PGP Key ID: 0x1A86E304
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]