| Deutsch English Français Italiano |
|
<4c1bfc3d01c8a48ad81d1fbf4587e5431cd9389b@i2pn2.org> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.quux.org!news.nk.ca!rocksolid2!i2pn2.org!.POSTED!not-for-mail From: Stefan Claas <fgrsna.pynnf@vagrearg.eh> Newsgroups: sci.crypt Subject: Re: What are the chances of this encrytion being broken? Date: Mon, 24 Mar 2025 20:07:13 +0100 Organization: i2pn2 (i2pn.org) Message-ID: <4c1bfc3d01c8a48ad81d1fbf4587e5431cd9389b@i2pn2.org> References: <vrrh0h$nscg$1@dont-email.me> <fCwjUEYVF8eg0zhdLcl3X+q7CCGal0Ox3PTmngktqnw=@writeable.com> <vrrovm$11oms$1@dont-email.me> <vrs7tj$1faj3$1@dont-email.me> MIME-Version: 1.0 Injection-Date: Mon, 24 Mar 2025 19:07:13 -0000 (UTC) Injection-Info: i2pn2.org; logging-data="1584231"; mail-complaints-to="usenet@i2pn2.org"; posting-account="ieSrCjSDShpZNyqIW52mlwIkg76Hsp+TOOO6KTdfCN8"; User-Agent: flnews/1.3.0pre29 (for GNU/Linux) Cancel-Lock: sha1:c3SA8bGxcF1W6Lp7vo8dOyqpQjo= X-Spam-Checker-Version: SpamAssassin 4.0.0 X-Ed25519-Sig: 190881658036763a59bba4582bace9f1ca7a7430ace965d7b93784e6d69e4dfa 305f028cb405af39203406d0fc5b503a3bcebbfdc781a862478c97a317c12b0f X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a X-Date: It's Mon Sep 11528 08:07:13 PM CET 1993, the September that never ends. Bytes: 4924 Lines: 74 Chris M. Thomasson wrote: > On 3/24/2025 7:07 AM, Richard Heathfield wrote: > > On 24/03/2025 13:10, The Running Man wrote: > > > On 24/03/2025 12:51 Richard Heathfield <rjh@cpax.org.uk> wrote: > > > > On 24/03/2025 11:32, The Running Man wrote: > > > > > On 24/03/2025 06:21 Richard Heathfield <rjh@cpax.org.uk> wrote: > > > > > > On 24/03/2025 04:51, The Running Man wrote: > > > > > > > On 23/03/2025 05:14 hal@invalid.com wrote: > > > > > > > > What are the chances that the encrypted text in this message > > > > > > > > could be > > > > > > > > broken? > > > > > > > > > > > > > > > > No one knows what program made the file. It's 256 bit encryption. > > > > > > > > > > > > > > > > How would a encryption expert go about attempting to decrypt the > > > > > > > > message? > > > > > > > > > > > > > > > > The password is a dozen words, many mispelled, plus punctuation;. > > > > > > > > > > > > > > > > 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 > > > > > > > > . > > > > > > > > > > > > > > I'd say the chances are close to zero. > > > > > > > > > > > > Unless it matters, in which case the probability rises to near > > > > > > certainty. > > > > > > > > > > > > > > > > Nonsense. Even the NSA has admitted they can't break > > > > > AES-256. > > > > > > > > (a) What makes you think the above ciphertext is AES-256? > > > > > > > > (b) If the NSA cares enough to try, they'll crack it using side > > > > channels (e.g. rubber hose). > > > > > > > > (c) In 700-odd bytes of ciphertext, only 65 distinct values > > > > appear, one of them 19 times. AES my arse. This is a home-grown > > > > algorithm, and not a particularly good one. All it'll take is for > > > > someone with enough time to care enough. > > > > > > > > > > Homegrown stuff doesn't apply. > > > > Of course it does! The question is *about* a homegrown cipher. You are > > answering the question you think should have been asked instead of the > > question that actually was asked. > > > > > Anyone with half a brain > > > would use vetted ciphers. > > > > The ciphertext is right there in the quoted text. Does it look to you > > like the output of a "vetted cipher"? > > > > > Rubber hosing isn't breaking encryption. > > > > Not elegantly, no. But if it gets the plaintext, it gets the plaintext. > > > > That's hurts because it 100% true. If they get the plaintext, then a > simple rubber hose broke it. ;^) I don't understand your rubberhose arguments, I must admit. If a sender has a Government trojan on his device, no rubberhose is needed. If the sender uses (without a Government trojan) anonymous Networks, which it seems you guys are not using (yet), how would be rubberhose applied, if they can't find the sender? Regards Stefan -- Onion Courier Home Server Mon-Fri 15:00-21:00 UTC Sat-Sun 11:00-21:00 UTC ohpmsq5ypuw5nagt2jidfyq72jvgw3fdvq37txhnm5rfbhwuosftzuyd.onion:8080 inbox