home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky uk.misc:3216 alt.conspiracy:14676
- Path: sparky!uunet!inmos!fulcrum!strath-cs!nntphost!jim
- From: jim@cs.strath.ac.uk (Jim Reid)
- Newsgroups: uk.misc,alt.conspiracy
- Subject: Re: Camilla-gate
- Message-ID: <JIM.93Jan27123206@hunter.cs.strath.ac.uk>
- Date: 27 Jan 93 12:32:06 GMT
- References: <1993Jan22.161524.20250@visionware.co.uk>
- <JIM.93Jan25163902@hunter.cs.strath.ac.uk> <C1GBBw.I0p@demon.co.uk>
- Sender: news@cs.strath.ac.uk
- Organization: Computer Science Dept., Strathclyde Univ., Glasgow, Scotland.
- Lines: 51
- Nntp-Posting-Host: hunter.cs.strath.ac.uk
- In-reply-to: pettsj@visigoth.demon.co.uk's message of 26 Jan 93 07:55:07 GMT
-
- In article <C1GBBw.I0p@demon.co.uk> pettsj@visigoth.demon.co.uk (James Petts) writes:
-
- In article <JIM.93Jan25163902@hunter.cs.strath.ac.uk> Jim Reid,
- jim@cs.strath.ac.uk writes:
- >It would be reasonable
- >to assume that the resources of these organisations are capable of
- >breaking ANY encryption system available for public use.
-
- Unlikely. Although it has never been proven, the RSA Public Key system
- is though to be secure using a 1024 bit modulus for the calculation.
-
- And where can any of us buy encryption devices which use RSA (let
- alone ones for real-time encoding/decoding of telephone
- conversations)?
-
- Remember too that exhaustive calculation like a complete search of
- the key space is an unproductive way of breaking codes. RSA can be
- broken by factoring huge numbers, if you want to wait until the end of
- the universe. Other techniques such as analysis of the ciphertext (say
- looking for repeating patterns) will yield insights into how the key
- is constructed. This may identify the key or reduce the key space to
- the point where it can be exhaustively searched in a reasonable time.
- It is this sort of cryptanalytical technique that gets used at
- Cheltenham or Fort Meade. Brute force attacks on the key space would
- take too long.
-
- Note too that a strong ciphersystem is in itself not secure. Care has
- to be taken with key management. How often have UNIX systems been
- broken into because users choose obvious passwords (keys) or make them
- public? This goes for DES, RSA and even Captain Marvel's Magic Decoder
- Ring.
-
- This view is reinforced when one considers that the NSA place
- restrictions on its use and distribution within the US.
-
- This is a popular misconception. Firstly, it's the US government which
- restricts the export of encryption technology, not the NSA (though
- they do advise the US government). Secondly, RSA Inc has patented the
- RSA algorithm in the USA. These patents don't apply in most of the
- rest of the world because of differences in patent law. RSA Inc won't
- export their product until they are able to protect it with overseas
- patents. [In the US, it seems that an algorithm can be patented,
- whereas the rest of the world only permits implementations of an
- algorithm to be patented and notthe algorithm itself.]
-
- If you want more detail I can post a FAQ on the subject of public
- key cryptography.
-
- No thanks. I have read enough books on this subject already.
-
- Jim
-