Deutsch   English   Français   Italiano  
<vs2ja1$38vc4$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail
From: Peter Fairbrother <peter@tsto.co.uk>
Newsgroups: sci.crypt
Subject: Re: What are the chances of this encrytion being broken?
Date: Thu, 27 Mar 2025 04:13:53 +0000
Organization: A noiseless patient Spider
Lines: 36
Message-ID: <vs2ja1$38vc4$1@dont-email.me>
References: <vrrh0h$nscg$1@dont-email.me>
 <fCwjUEYVF8eg0zhdLcl3X+q7CCGal0Ox3PTmngktqnw=@writeable.com>
 <vrrovm$11oms$1@dont-email.me> <vrs7tj$1faj3$1@dont-email.me>
 <4c1bfc3d01c8a48ad81d1fbf4587e5431cd9389b@i2pn2.org>
 <d2i3ujh01com46qak21o4j2b1ghnvnubkf@4ax.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 27 Mar 2025 05:13:54 +0100 (CET)
Injection-Info: dont-email.me; posting-host="10926ed5b4d5af6acd08eea804e7f5fb";
	logging-data="3440004"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX188Osp7yhVtvDNBoMDfjZIJtHYFRmu1muo="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:Up5jaCVtSO1qTB4iTu0NGIikJ7k=
In-Reply-To: <d2i3ujh01com46qak21o4j2b1ghnvnubkf@4ax.com>
Content-Language: en-GB
Bytes: 2401

On 24/03/2025 21:33, hal@invalid.com wrote:

> And - I am not speaking of crypto for mass use. Only for personal use,
> wherein one *can* make it useful and secure.

No. You can't. Even if you are an expert.

You might have a whole bunch of experts trying to break it, at which 
point you lose.

It's known as Schneier's law.

NSA employ more experts than anyone else (except maybe Russia or China). 
They are the biggest employer of mathematicians in the US. And they have 
very big computers.


Peter Fairbrother.


Schneier's Law:

"Anyone, from the most clueless amateur to the best cryptographer, can 
create an algorithm that he himself can't break. It's not even hard.

What is hard is creating an algorithm that no one else can break, even 
after years of analysis.

And the only way to prove that is to subject the algorithm to years of 
analysis by the best cryptographers around."

Unfortunately Schneier was a little wrong: years of cryptanalysis by 
people who keep their results from you don't help you any, and even 
years of public cryptanalysis don't actually "prove" anything.