Very Hot Topic (More than 25 Replies) A Public Challenge to Nick Savastano (Read 34372 times)
Paste Member Name in Quick Reply Box orolan
Especially Senior User
*****
Offline



Posts: 363
Joined: Dec 25th, 2002
Re: A Public Challenge to Nick Savastano
Reply #15 - Apr 1st, 2003 at 8:58pm
Mark & QuoteQuote Print Post  
George,

So true. I rephrase to this: "Legitimate proven technologies are safe only for a few months, while "snake oil", quackery and old wives' tales may last for an eternity."
That better? Wink
  

"Most of the things worth doing in the world had been declared impossible before they were done." &&U.S. Supreme Court Justice Louis D. Brandeis
Back to top
WWW  
IP Logged
 
Paste Member Name in Quick Reply Box Anonymous
Guest


Re: A Public Challenge to Nick Savastano
Reply #16 - Jun 2nd, 2003 at 10:00pm
Mark & QuoteQuote Print Post  
Quote:
Let's think about this....if man has created it,then man can defeat it... 

...learning is always a step ahead of technology because it is required to invent new technology in the first place...


orolan wrote on Apr 1st, 2003 at 8:58pm:
"Legitimate proven technologies are safe only for a few months, while "snake oil", quackery and old wives' tales may last for an eternity."
That better?


No orolan.  Not better.  I know it's off the subject completely, but the RSA encryption algorithm is a bit of long lasting technology that has not been cracked.  It is, however, based on the belief that P != NP (i.e., the set of problems solvable in deterministic Polynomial time is not equal to the set of problems solvable in Nondeterministic Polynomial time).  The statement P != NP is based on belief, and not on fact.  It has not been proven that there is no efficient algorithm for factoring large positive integers.  It has also not been proven that there does exist such an algorithm.  Thus, the belief that RSA encryption (as used by PGP and others) is absolutely safe is a dangerous one at best.  A good general reference on the matter is "Computers and Intractibility" by Garey and Johnson.

This is just to demonstrate that some technologies exist that people put an unfounded amount of faith in other than just the polygraph.  These technologies can still be valuable and useful to the people who use them.  The art of making gross generalizations on subjects where the artist has a lack of expertise should be left to the politicians, in my humble opinion.

By the way, I have found this site and this subject in general very interesting and informative.  I personally find lie detector tests an affront to my right to privacy.  Thanks George.
  
Back to top
 
IP Logged
 
Paste Member Name in Quick Reply Box orolan
Especially Senior User
*****
Offline



Posts: 363
Joined: Dec 25th, 2002
Re: A Public Challenge to Nick Savastano
Reply #17 - Jun 3rd, 2003 at 12:44am
Mark & QuoteQuote Print Post  
Anonymous,
I beg to differ with you. The RSA 64-bit RC5 encryption algorithm was cracked on July 14th, 2002.
While it took nearly fours years and the combined computing power of the equivalent of 46,000 2GHZ AMD Athlons, the fact is, it was done.
And who knows how many algorithms have been cracked by the super-computers in the basement of the NSA building? Do you think they would actually tells us?
Your cautions on the usage of PGP should be heeded by all. I for one would not use 64-bit encryption, or RSA for that matter. I prefer 128-bit Blowfish encryption.
  

"Most of the things worth doing in the world had been declared impossible before they were done." &&U.S. Supreme Court Justice Louis D. Brandeis
Back to top
WWW  
IP Logged
 
Paste Member Name in Quick Reply Box Marty
Especially Senior User
*****
Offline



Posts: 499
Joined: Sep 27th, 2002
Re: A Public Challenge to Nick Savastano
Reply #18 - Jun 3rd, 2003 at 4:07am
Mark & QuoteQuote Print Post  
orolan wrote on Jun 3rd, 2003 at 12:44am:
Anonymous,
I beg to differ with you. The RSA 64-bit RC5 encryption algorithm was cracked on July 14th, 2002.
While it took nearly fours years and the combined computing power of the equivalent of 46,000 2GHZ AMD Athlons, the fact is, it was done.
And who knows how many algorithms have been cracked by the super-computers in the basement of the NSA building? Do you think they would actually tells us?
Your cautions on the usage of PGP should be heeded by all. I for one would not use 64-bit encryption, or RSA for that matter. I prefer 128-bit Blowfish encryption.


No, RSA PKC has not been "cracked" though increasingly larger but still small key sizes have been broken by bruteforce keyspace searches. What is remarkable is the advance in pure hardware power and configurable hardware. Us techie types tend to fixate on key length and such but that isn't where the threat is. The threat, my friend, is from mundane things, typically money oriented. For example, I had some unknown person clone one of my credit cards (a cottage industry it seems) and a fake card (and probably ID) was generated. All these folks had to do was swipe the magnetic stripe and email the bitstream to their buds in Australia. The next day they hit up all the Jewelry stores in the QVC Mall.  BTW, they didn't even need a PIN to do that. This country badly needs ways to authenticate identity and I really don't understand why that is such an anathema.

As for the NSA, I don't much care whether they have cracked RSA or not. My guess is they they don't worry too much about it. There are far simpler ways for them to do their job. 

-Marty
  

Leaf my Philodenrons alone.
Back to top
 
IP Logged
 
Paste Member Name in Quick Reply Box Twoblock
God Member
*****
Offline



Posts: 732
Location: AR.
Joined: Oct 15th, 2002
Gender: Male
Re: A Public Challenge to Nick Savastano
Reply #19 - Jun 3rd, 2003 at 4:37am
Mark & QuoteQuote Print Post  
Hey guys

RSA, PKC or any encryption can be easily broken with the combination of prigatorshinpep and Phytilaramic-packalumer technologies run simultaneously with fraith and framish. I did this and shouted, "BLAST THAT PFLATERRAP -  I think I've got it!"

IT WORKED
  
Back to top
 
IP Logged
 
Paste Member Name in Quick Reply Box Anonymous
Guest


Re: A Public Challenge to Nick Savastano
Reply #20 - Jun 3rd, 2003 at 4:59am
Mark & QuoteQuote Print Post  
Fair enough.  Yes, cracking 128 bit encryption requires far more computing power than 64 bit, and if I were going to use a public-private key encryption system, I would certainly choose the highest number of bits possible, but the main point is that if someone develops an efficient factorization algorithm (say O(lg n) where n is the number being factored) then the number of bits used is irrelevant.  Actually, the beauty of RSA (and similar public-private key schemes) is not that they are hard to crack conceptually, but rather that doing so requires a prohibitive amount of computing power per instance.  Why does it take so much computing power?  Only because no one has yet publicly proven that P = NP, and it's a very widely held BELIEF that P != NP.  The person that can prove it either way gets at least 1 miliion dollars (offered by the Clay Mathematics Institute -- see http://www.claymath.org/Millennium_Prize_Problems and look for P vs NP) though the solution would potentially be worth billions to the private sector since it impacts all of the physical sciences -- reading encrypted e-mail is the least interesting application in my opinion.

If memory serves (and it generally doesn't anymore) a grad student in California cracked an instance of 40-bit encryption in ~4 days back in the late 90's.  I'll take your word that a 64-bit instance was cracked in ~4 years with a bunch of computers (probably a distributed environment running a variation of the quadratic sieve factorizer -- see http://mathworld.wolfram.com/QuadraticSieve.html for a detailed explanation) but as you also point out, the NSA may very well have a factorizer in hand that works in P time (O(n^x), x some constant, n = the number of digits or bits in the number) that is capable of breaking any public-private key encryption system, and simply has kept the public ignorant of the fact.  The main point is that we don't know simply because the possible existence of such a thing can not be proven or disproven.  There are actually a lot of similarities between polygraphs and many number-theoretical assertions, algorithms, and open problems.

At any rate, some technological innovations can be considered nothing more than tools that have some inherent value to the people that use them (like polygraphs for polygraphers and number theoretical conjectures for encryption algorithm designers), even if the actual value is not necessarily as great as what most people believe it to be.  That's really the extent of the point I was trying to make.  Well, that, and one of my pet peaves happens to be gross generalizations like "In today's world no technology is safe for more than a few months.".  The encryption algorithms that rely on a NP-Complete problem have been safe since their inception because of their very nature.
  
Back to top
 
IP Logged
 
Paste Member Name in Quick Reply Box Skeptic
God Member
*****
Offline



Posts: 549
Joined: Jun 24th, 2002
Re: A Public Challenge to Nick Savastano
Reply #21 - Jun 3rd, 2003 at 6:54am
Mark & QuoteQuote Print Post  
Quote:
Fair enough.  Yes, cracking 128 bit encryption requires far more computing power than 64 bit, and if I were going to use a public-private key encryption system, I would certainly choose the highest number of bits possible, but the main point is that if someone develops an efficient factorization algorithm (say O(lg n) where n is the number being factored) then the number of bits used is irrelevant.


I have to agree with Marty, Anonymous -- RSA hasn't been "cracked", just brute-forced.  What you're describing above (the discovery of an efficient factoring algorithm) would be a true "crack".  It would also represent quite an advance in mathematics, considering that the factoring problem has been around for a couple of millenia or more.

Of course, El Gamal encryption (which PGP can also use) relies upon discrete logarithms, rather than factoring, so that's another problem entirely. Smiley

Nice overview, BTW.

Skeptic
  
Back to top
 
IP Logged
 
Paste Member Name in Quick Reply Box George W. Maschke
Global Moderator
*****
Offline


Make-believe science yields
make-believe security.

Posts: 6218
Joined: Sep 29th, 2000
Re: A Public Challenge to Nick Savastano
Reply #22 - Jun 3rd, 2003 at 7:43am
Mark & QuoteQuote Print Post  
On the subject of PGP encryption, note that AntiPolygraph.org uses it. Our PGP public key is included on our contact page.
  

George W. Maschke
I am generally available in the chat room from 3 AM to 3 PM Eastern time.
Tel/SMS: 1-202-810-2105 (Please use Signal Private Messenger or WhatsApp to text or call.)
E-mail/iMessage/FaceTime: antipolygraph.org@protonmail.com
Wire: @ap_org
Threema: A4PYDD5S
Personal Statement: "Too Hot of a Potato"
Back to top
IP Logged
 
Paste Member Name in Quick Reply Box Marty
Especially Senior User
*****
Offline



Posts: 499
Joined: Sep 27th, 2002
Re: A Public Challenge to Nick Savastano
Reply #23 - Jun 3rd, 2003 at 7:46am
Mark & QuoteQuote Print Post  
Skeptic,

It's funny that the topic has wandered off into crypto. Just a few days ago I posted a program to codeproject demonstrating how simple it is to force a specific CRC in a file. One often sees it stated that CRC's shouldn't be used for message digest apps but a lot of people seem to think they are candidates and a lot of crypto tyros fall in love with them. It's also applicable to error correcting codes, an area I've been intrigued by for decades.

-Marty
  

Leaf my Philodenrons alone.
Back to top
 
IP Logged
 
Paste Member Name in Quick Reply Box Skeptic
God Member
*****
Offline



Posts: 549
Joined: Jun 24th, 2002
Re: A Public Challenge to Nick Savastano
Reply #24 - Jun 3rd, 2003 at 8:20am
Mark & QuoteQuote Print Post  
Marty wrote on Jun 3rd, 2003 at 7:46am:
Skeptic,

It's funny that the topic has wandered off into crypto. Just a few days ago I posted a program to codeproject demonstrating how simple it is to force a specific CRC in a file. One often sees it stated that CRC's shouldn't be used for message digest apps but a lot of people seem to think they are candidates and a lot of crypto tyros fall in love with them. It's also applicable to error correcting codes, an area I've been intrigued by for decades.

-Marty


When I interviewed at NSA for an analyst position (man, I really would have liked working there), I had a very interesting conversation regarding encryption.  Suffice it to say that I'm convinced there are serious limits to what that organization can do, as well as impressive capabilities.  They have a tough mission.

My exposure to encryption has been limited to a good book by Schneier (Applied Cryptography).  But even I know that you want to use a bona-fide one-way hash for digest purposes Smiley

Skeptic
  
Back to top
 
IP Logged
 
Paste Member Name in Quick Reply Box Marty
Especially Senior User
*****
Offline



Posts: 499
Joined: Sep 27th, 2002
Re: A Public Challenge to Nick Savastano
Reply #25 - Jun 3rd, 2003 at 10:09am
Mark & QuoteQuote Print Post  
Skeptic,

I recall surfing the NSA site some years back. They had quite a touching memorial page for the USS Liberty. I had only vaguely remembered it (back in Johnson's days I think). A lot of casualties. They were just in the wrong place at the wrong time.

As for Schneier's book, it is a pretty good intro book, especially for engineers. He also has a nice security company called Counterpane and publishes a worthwhile newsletter. There is a free classic text on the web. I think it's called "The Handbook of Cryptology" with downloadable pdf files for each chapter. Highly recommended. I found it helpful for a project I was involved in a while back.

Dorothy Denning has done some great work on system vulnerabilities and puts a lot of the social-technical  issues into context.

-Marty
  

Leaf my Philodenrons alone.
Back to top
 
IP Logged
 
Paste Member Name in Quick Reply Box Fed-up Fed
Guest


Re: A Public Challenge to Nick Savastano
Reply #26 - Jun 3rd, 2003 at 11:47pm
Mark & QuoteQuote Print Post  
Don't kid yourself guys, there is no such thing as privacy.
  
Back to top
 
IP Logged
 
Paste Member Name in Quick Reply Box Fair Chance
God Member
*****
Offline



Posts: 551
Joined: Oct 10th, 2002
Re: A Public Challenge to Nick Savastano
Reply #27 - Jun 4th, 2003 at 4:25pm
Mark & QuoteQuote Print Post  
Dear Fed-up Fed,

I hope you are wrong.  If privacy does not exist, censorship of ideas from fear of retaliation will become widespread.  Freedom of expression will become stifled and the diversity of this country which has always created new ideas, hopes, and dreams will evaporate. 

I am an optimist that believes privacy and security should be able to co-exist.  America must be very careful to weigh security benefits against personal privacy and freedoms.

Regards.
  
Back to top
 
IP Logged
 
A Public Challenge to Nick Savastano

Please type the characters that appear in the image. The characters must be typed in the same order, and they are case-sensitive.
Open Preview Preview

You can resize the textbox by dragging the right or bottom border.
Insert Hyperlink Insert FTP Link Insert Image Insert E-mail Insert Media Insert Table Insert Table Row Insert Table Column Insert Horizontal Rule Insert Teletype Insert Code Insert Quote Edited Superscript Subscript Insert List /me - my name Insert Marquee Insert Timestamp No Parse
Bold Italicized Underline Insert Strikethrough Highlight
                       
Change Text Color
Insert Preformatted Text Left Align Centered Right Align
resize_wb
resize_hb







Max 200000 characters. Remaining characters:
Text size: pt
More Smilies
View All Smilies
Collapse additional features Collapse/Expand additional features Smiley Wink Cheesy Grin Angry Sad Shocked Cool Huh Roll Eyes Tongue Embarrassed Lips Sealed Undecided Kiss Cry
Attachments More Attachments Allowed file types: txt doc docx ics psd pdf bmp jpe jpg jpeg gif png swf zip rar tar gz 7z odt ods mp3 mp4 wav avi mov 3gp html maff pgp gpg
Maximum Attachment size: 500000 KB
Attachment 1:
X