Bitcoin Forum
May 01, 2024, 09:28:07 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 »
1  Bitcoin / Bitcoin Discussion / Re: Keyless encryption and passwordless authentication on: September 17, 2021, 02:09:14 PM
Password less authentication ?
Okay so what do you think would be used instead of a password ?
Fingerprint ?
Face lock ?
Voice recognition ?
The authenticator by Google?
----
Except the last one , I do believe each and everyone of them comes with a fault , come on one can actually do something to a person to connect with the device .. unfortunately us traders hold most in our mobile phones and I do think not just passwords , but everything at once all the things that I listed are not enough too  Smiley you can never be more secure .
=================
The fact is that the issues of encryption of information are more or less well resolved.
Few people want to use uncertified encryption technologies
encryption technologies (such as ours, KE), but the issue of passwordless
authentication is well unsolved.

It is especially relevant for banks, for their security systems.

The problem of phishing in the usual password authentication is not very well solved,
e.g. by increasing authentication factors (biometrics, SMS, temporary
valid codes, etc.), two- and even three-factor authentication systems.
All these technologies are only modification of authentication by stable factors,
assigned to this or that client.

No really working password-free authentication.
And yet, billions have already been invested in this topic by the world's leading corporations.

Therefore, it is necessary to clearly define what to call what.
let's make such a definition:

If in this closed channel of communication (SCC) is observed:
- a rapidly changing, strictly deterministic, known only to the members of that VCS - digital factor for authentication;
- any and each authentication factor is used only once;
- any and each authentication factor is not generated in advance, is not transmitted through third-party channels (local), and does not require storage;
- authentication occurs continuously, does not stop the whole communication session, a priori for each data packet, in both directions;
- any and every authentication factor is not derived from any other authentication factor or from any set of them;
- the fast changeability of any authentication factor is in no way related to physical time and has no stable generation function;
- generation of any authentication factors does not require the user to create, store, use any password information,   
then such method of authentication, within the framework of this technology, will be called password-free authentication.

2  Bitcoin / Development & Technical Discussion / Re: I don't believe Quantum Computing will ever threaten Bitcoin on: January 06, 2021, 12:56:30 PM
Today, the main danger for hacking comes from artificial intelligence. And it is no longer theory, it is practice. There are already break-ins based on this technology. Keys and passwords are being compromised again. It was reported this month that more than one billion accounts could be hacked using artificial intelligence. Why? Because there's something to steal...
... Now, back to the topic. Public key cryptography uses randomness generated from sources to generate the private key. Since the generation methods involves large amount of entropy, if given a public key, how would you use AI to tackle the algorithm and solve for the appropriate private key?
-----------------------------
Now back to the subject of the question you asked.
How can we use artificial intelligence to solve the problem of finding a private key if we know the public key?
I could be wrong, but the principle of artificial intelligence is algorithms, it is a program with self-development.
If there was an algorithm to find the private key through the public key, there would not be the cryptography we use. Makes sense?
It makes sense, except for cryptography built on elliptic curves, for the reasons described in the last post.
So, the solution algorithm known to us (not to humans in general) does not exist.
Then, I would use artificial intelligence in another way - I would break the whole amount of computation into billions of components (into groups of large sets of numbers to check), and in a mode of covertly forcing computation on all remote network computers, make them work on the problem in secret. This is similar to the process of covert mining of a cryptocurrency, the task being distributed to all systems available for such a covert attack. Then all that remains is to hope for a result in polynomial time. Naturally, I would apply all known algorithms that reduce calculations when solving discrete logarithm or factorization problems of large numbers.
As for the human social graph and guessing, artificial intelligence will help with passwords if they are not random, but will not help at all with keys, with the pair of public and private key, which are generated without taking into account the peculiarities of the person's personality.
And of course, the best and most effective way to get the public key with artificial intelligence is banal phishing, theft, covert espionage, Trojan horse program and other nasties, with which the artificial intelligence will be loaded in the first place.
In that sense, it's interesting to have a discussion, will our security increase or decrease in the age of artificial intelligence?
It's not as simple a question as it seems at first glance...
3  Bitcoin / Bitcoin Discussion / Re: Keyless encryption and passwordless authentication on: January 06, 2021, 12:33:04 PM
Is this method so safe? For some reason, I'm not sure.
--------------
Information security systems are based on rules, technologies, security protocols, and cryptography. The core of information security systems is cryptography. All modern symmetric cryptography is built on the same principle: the encryption scheme is determined by the key. And even if the cryptography itself is "conditionally secure" or absolutely secure (absolutely strong Vernam ciphers), the fact of having a key will always be a natural vulnerability in any security system. First of all, attacks will be aimed at keys (passwords), the "human factor" will be exploited most successfully.
It is this factor that instantly and irrevocably weakens to zero any most secure cryptographic system and consequently the security system in general. There will be fatal consequences if the fact of compromising key or password information remains a secret to the attacker for a long time. The same danger will be acute for any new cryptography that will exist in the era of quantum computers, for any newest cyber defense system of tomorrow.
4  Bitcoin / Bitcoin Discussion / Re: How long will existing encryption last? on: January 06, 2021, 12:28:35 PM
This couldn't be a danger, in spite of the fact that there are various amazing supercomputers these days, encryptions are made in crypto to totally scramble information. I realize somewhat about hashing however I'm not a PC proficient individual. I accept, what we are utilizing are hashing calculations that principally not permitting the information to be decoded returning to its source. Also, that innovation makes it the most secure and solid for individuals. Before long, these ground-breaking supercomputers won't be centered around decoding previously existing information, yet principally to make more grounded encryption.
---------------------
There is no way to predict the level of future computers based on information about today's technology.
This has always been the case. But one thing is clear, in general terms, that technology will evolve. Therefore, first of all, the technology of stealing and phishing our confidential data, our keys and our passwords will develop and become more and more dangerous.
Fraudsters will never attack cryptography, any cryptography, even the weakest one - they won't. They will always steal keys and passwords.
Therefore, the time of key-based modern cryptography, in general any post-quantum cryptographic system based on keys - is a thing of the past.
We are waiting for totally new technologies of keyless encryption, passwordless authentication, a world without phishing.
In fact, it seems fantastic, seems silly and irrelevant.  But this has always been the case, the most fantastic assumptions have always come true and surprised people of the future, how someone in the past was able to foresee our future.
Think about it.
What will happen to our security when computers are millions of times more powerful than they are today? Will our security increase or decrease? This is not as simple a question as it may seem at first glance.
I invite discussion. 
5  Bitcoin / Hardware wallets / Re: Is the hardware wallet really safe? on: December 27, 2020, 02:06:26 PM
And while there are no comments, here's the latest news on our password and key-based security:
AI-assisted password guessing! Cybercriminals are using ML to improve user password guessing algorithms. More traditional approaches, such as HashCat and John the Ripper, already exist and compare different variants of the password hash to successfully identify the password that matches the hash. However, using neural networks and Generative Adversarial Networks (GAN), cybercriminals will be able to analyze vast sets of password data and generate password variations that match a statistical distribution. In the future, this will lead to more accurate and targeted guessing of passwords and a higher chance of profit.

In a February 2020 clandestine forum post, we found a GitHub repository that has a password analysis tool with the ability to parse 1.4 billion accounts and generate password variation rules.
In addition, we also saw a post listing a collection of open-source hacking tools that have been hacked [...] to. Among these tools is AI-based software that can analyze a large set of password data from data leaks. This software ensures that it extends its ability to guess passwords by teaching GAN how people tend to change and update passwords, such as changing "hello123" to "h@llo123" and then to "h@llo!23".
6  Bitcoin / Development & Technical Discussion / Re: I don't believe Quantum Computing will ever threaten Bitcoin on: December 27, 2020, 02:00:44 PM
Today, the main danger for hacking comes from artificial intelligence. And it is no longer theory, it is practice. There are already break-ins based on this technology. Keys and passwords are being compromised again. It was reported this month that more than one billion accounts could be hacked using artificial intelligence. Why? Because there's something to steal...
How do you think AI would affect ECDSA or more specifically public key cryptography? AI (or rather machine learning) does analysis based on certain trends and using passwords/dictionary attacks usually results in the algorithm being fed with big data and finding association and possible passwords based on the targets. If you want to bruteforce using this method, you could find success with leaked database but most likely not with sites that are designed to deter such attempts.

Now, back to the topic. Public key cryptography uses randomness generated from sources to generate the private key. Since the generation methods involves large amount of entropy, if given a public key, how would you use AI to tackle the algorithm and solve for the appropriate private key?
--------------------------
I do not see the use of artificial intelligence technology to solve the problem of breaking cryptography on elliptic curves. The point is that this problem, so far, belongs to the class of NP-hard problems. Any program, and artificial intelligence is a program with feedback on itself, doesn't like to solve such problems. the program needs an algorithm. And NP-hard problems do not have a known algorithm to solve them in polynomial time.
It seems that there is not.
However, there are very big doubts about it.
No, it is not that this problem has solution algorithms that are hidden from us, but that initially, elliptic curves in finite number fields - have hidden loopholes, weak, but this is known only to the initiated. Here, read this analysis and draw your own conclusions.
Analytica, in abbreviated form, on this topic:
-----------------------   

I do not want to escalate the fear of those present here, but you need to know this if you study the issue of security - for real.

This material reasonably answers important 2 questions:

1. Is cryptography on elliptic curves so safe as we think?

2. Are quantum computations really dangerous for
modern public key cryptosystems?

In higher circles, official organizations, whose activities are directly related to cryptography, since 2015, there is a lively activity.
Why everything so suddenly turned up so hard, no one explains to us.
They probably know more than they say. Yes, and hide the ends ...

The competent organizations involved in setting universal technical standards are very noticeably concerned about the problems of the so-called quantum-safe cryptography. Here are the facts that you should pay attention to, even to us, non-specialists in the field of cryptography.

The next international symposium entitled “ETSI / IQC Workshop on Quantum Secure Cryptography” (https://www.etsi.org/events/1072-ws-on-quantumsafe was held on September 19-21, 2016 in Toronto, Canada, 2016). To emphasize the significance of this event, it should be clarified that ETSI is the European Telecommunications Standards Institute (that is, the industry equivalent of the American NIST, the main standardization body in the United States). And IQC, respectively, is the Institute of Quantum Computing at the University of Waterloo, that is, one of the world's leading research centers that have been dealing with cryptography problems in the context of quantum computers for more than a dozen years.

With such solid organizers of the event, not only leading scientists of academic structures and industry, but also important people from the leadership of transnational corporations and government departments of Europe, North America, Japan, China and South Korea were noted among the participants of the symposium.

And besides, there are also big chiefs of special services involved in the protection of information in states such as Britain, Canada and Germany.

And all these very busy people gathered in Toronto, back in 2016, to discuss how to strengthen cryptography to withstand technologies that, even according to the most optimistic estimates, will become a real threat in twenty years, at least.

If we take into account the fact that, almost simultaneously, in August 2016, NIST (USA) officially announced the launch of its own large-scale program for the transition from traditional cryptography to “post-quantum” cryptography, then the conclusion will be quite obvious.

In the world of cryptography, big changes have already clearly begun. And they started up somehow very hastily and even with some signs of panic. Which, of course, raises questions. And that's why.

In the United States, the first official signal that an urgent need to do something with the modernization of traditional cryptography was August 2015. It was then that the National Security Agency, as the main authority of the state in the field of ciphers, issued a statement on significant changes in its basic policy, in connection with the need to develop new standards for post-quantum cryptography, or, briefly, PQC (National Security Agency, Cryptography today, August 2015 )
The parties involved in this process, and the NSA itself, stated that it considers the present moment (this is still 2015-2016) the most suitable time to come to grips with the development of new protocols for public-key cryptography. Such cryptography, where the strength of the cipher will not depend on calculations using quantum computers.

Naturally, the idea comes that someone somewhere, secretly from the rest, still built a real quantum computer, back in those days. And since the most visible and decisive initiative for the early transition to a new, quantum-safe cryptography was demonstrated by the NSA, it is easy to guess which state comes to mind in the first place. Having not only the largest budget for such initiatives, but also all the necessary scientific and technical capabilities. The NSA, an organization highly classified and secretly able to use the most powerful supercomputers on the planet.

In an open community of cryptographers, puzzled by the haste of new initiatives, there are naturally a lot of other various speculations to explain what is happening. The most informative, perhaps a review work, summarizing and comparing all such hypotheses and assumptions without a final answer, can be considered the well-known article “Puzzle wrapped in a riddle”, prepared by the very famous cryptographers Neil Koblitz and Alfred Menezes at the end of 2015 (Neal Koblitz and Alfred J . Menezes, “A Riddle Wrapped in an Enigma”).
In order to make it clearer why it makes sense to focus on the facts precisely from this analytical work, two points should be briefly clarified.
First: what place do its authors occupy in open academic cryptography.
Second: how closely their own scientific developments are intertwined with the NSA's initiatives to accelerate the transfer of used cryptographic algorithms to other tracks.

The American mathematician and cryptographer Neil Koblitz, is (along with Victor Miller) one of those two people who in 1985 simultaneously and independently came up with a new public key crypto scheme, called ECC (this is, we recall, an abbreviation for Elliptic Curve Cryptography , that is, "cryptography on elliptic curves").

Without going deep into the technical details of this method and its difference from the RSA cryptographic scheme that appeared earlier, we note that ECC has obvious advantages from the point of view of practical operation, since the same theoretical stability of the algorithm is provided with a much shorter key length (for comparison: 256-bit ECC operations are equivalent to working with a 3072-bit module in RSA). And this greatly simplifies the calculations and significantly improves the system performance.
The second important point (almost certainly related to the first) is that the extremely secretive NSA in its cryptographic preferences from the very beginning began to lean in favor of ECC. (!)

In the early years and decades, this reached the academic and industrial circles only in an implicit form (when, for example, in 1997, an official of the NSA, Jerry Solinas, first spoke at the Crypto public conference - with a report on their modification of the famous Koblitz scheme).

Well then, it was already documented. In 2005, the NSA published its recommendations on cryptographic algorithms in the form of the so-called Suite B (“Set B”) - a set of openly published ciphers for hiding secret and top-secret information in national communication systems.

All the basic components of this document were built on the basis of ECC, and for RSA, the auxiliary role of the “first generation” (!) Was assigned, necessary only for a smooth transition to a new, more efficient cryptography on elliptic curves ... (!)
Now we need to remember about Alfred Menezes, the second co-author of the article about "Puzzle, shrouded in a riddle." Canadian mathematician and cryptographer Menezes has been working at the University of Waterloo, one of the most famous centers of open academic cryptography, all his scientific life since the mid-1980s. It was here that in the 1980s, three university professors created Certicom, a company dedicated to the development and commercial promotion of cryptography on elliptic curves.

Accordingly, Alfred Menezes eventually became not only a prominent Certicom developer and author of several authoritative books on ECC crypto schemes, but also a co-author of several important patents describing ECC. Well, the NSA, in turn, when it launched its entire project called Suite B, previously purchased from Certicom a large (twenty-odd) package of patents covering “elliptical” cryptography.

This whole preamble was needed in order to explain why Koblitz and Menezes are precisely those people who, for natural reasons, considered themselves knowledgeable about the current affairs and plans of the NSA in the field of cryptographic information protection.
However, for them, the NSA initiative with a sharp change of course to post-quantum algorithms was a complete surprise. (!)
Back in the summer of 2015 (!) The NSA “quietly”, without explaining to anyone at all, removed the “P-256” ECC algorithm from its kit, while leaving it with its RSA equivalent with a 3072-bit module. Moreover, in the NSA's accompanying statements it was quite clearly said that all parties implementing the algorithms from Suite B now no longer make any sense to switch to ECC, but it is better to simply increase the RSA key lengths and wait until new post-quantum ciphers appear ...
But why? What is the reason for such a sharp rollback to the old RSA system? I do not think that such a serious organization will make such serious decisions, for no reason.
Koblitz and Menezes have every reason to consider themselves people competent in the field of cryptography on elliptic curves, but they did not hear absolutely anything about new hacking methods that compromised “their” crypto scheme. So everything that happens around ECC amazed mathematicians extremely.
People who have close contacts with this industry know that large corporations that provide cryptographic tasks and equipment for the US government always get some kind of advance warning about changing plans. But in this case there was nothing of the kind.
Even more unexpected was the fact that no one from the NSA addressed the people from NIST (USA), who are responsible for the open cryptographic standards of the state.

And finally, even the NSA’s own cryptographic mathematicians from the Information Security Administration (IAD) were extremely surprised by the surprise that the leadership presented them with their post-quantum initiative ...

It can be concluded that those very influential people who in the bowels of the NSA initiated a public change of course did this without any feedback and consultation, even with their own experts. It is to this conclusion that Koblitz and Menezes come in their analyzes. And they readily admit that in the end no one really understands the technical background of everything that happens here.
The conclusion suggests itself that there was some unknown activity, some hidden actors.

For an adequate perception of intrigue, it is very desirable to know that in fact the principles of public key cryptography were discovered almost simultaneously (in the 1970s) in two fundamentally different places at once. At first, a few years earlier, this was done by three secret cryptographs within the walls of the British secret service GCHQ, an analogue and the closest partner of the American NSA. But as it has long been wound up, everything was done in deep secrecy and "only for yourself."

The discovery was not made by GCHQ full-time employees, but by the mathematicians of the CESG unit, responsible for national ciphers and the protection of government communications systems in the UK. And the close interaction between the GCHQ and the NSA of the USA takes place primarily along the lines of joint intelligence activities. In other words, since the NSA also has its own IAD (Information Assurance Directorate) department, specializing in the development of cryptographic algorithms and information protection, the discovery of British colleagues was a complete surprise for the mathematicians of this unit. And for the first time they learned about it from their fellow spies who closely interact with the British ...

And when the same algorithms, in fact, based on factorization and discrete logarithms, regardless of the special services, were soon invented in the USA by open community researchers (Diffie, Hellman, Merkle, Raivest, Shamir, Adleman), the NSA made a huge effort to cram this genie back to the bottle.

Without revealing that the special service already has this math, the NSA chiefs simply tried in every possible way to prevent scientists from publishing this information widely. National security advocates have been pushing that strong cryptography is too serious a weapon, and their new public key encryption algorithms allow anyone, even people and parties who have never met each other, to be hidden from control.

As everyone knows, absolutely nothing with a ban on knowledge and gagging scientists at the NSA did not work. As a result, the open scientific community was very angry with the NSA. And besides, under the pressure of scientists and industry, it was not the spy intelligence service, but the civilian structure, NIST, USA, that began to lead the development and implementation of commercial cryptography in the country.

And although this story is very old, it is quite clearly repeated. Unless, of course, watch carefully.

The ETSI / IQC International Symposium on Quantum Secure Cryptography (in 2016), from which this story began, has several notable features.
Firstly, it was very solidly represented by the heads of important structures, special services of Great Britain, Canada, Germany. All these national special services are analogues of the American NSA. However, absolutely no one was mentioned explicitly from the NSA. And this, of course, is not an accident.

There is plenty of evidence, both from business leaders and directly from the heads of intelligence agencies, that after revelations from Edward Snowden, almost the entire US IT industry (not to mention other countries) reacts extremely negatively to NSA activities. In other words, at international forums discussing ways to strengthen cryptography in the light of new threats, it is now prudent for the NSA to simply not shine.

Another notable feature of what is happening is that this “workshop” in Toronto is not the first, but the fourth in a row. The first was in 2013 in Paris, and the second - especially interesting for us - took place in the fall of 2014 in the capital of Canada, Ottawa.
This event is interesting for the reason that there was a highly unusual report on behalf of the secret British secret service GCHQ (P. Campbell, M. Groves, D. Shepherd, "Soliloquy: A Cautionary Tale"). This is a report from the CESG information security division, which was personally made by Michael Groves, who leads cryptographic research at this intelligence agency.

It must be emphasized here that it is completely uncharacteristic for people from the British special services to talk about their secret developments at open conferences. However, this case was truly exceptional.

In his report, Groves not only said that British cryptographers have been developing quantum-safe algorithms for a long time, since the beginning of the 2000s.

At the same time, it is important that the decision to completely refuse (and not to strengthen-modernize the old design) was mainly made by the special services, due to a very powerful and very impressive attack by the British, developed back in 2013 (!) By a group of researchers from the open academic community . In the work of these authors: K. Eisentraeger, S. Hallgren, A. Kitaev, and F. Song. "A quantum algorithm for computing the unit group of an arbitrary degree number field." In STOC ACM, 2014, an essentially new quantum attack of a very general type is described, covering, in particular, a wide range of "post-quantum" crypto circuits, including Soliloquy, unknown to anyone at that time ...

The effect of this “half-open” speech by a large cryptographer of the British secret service turned out to be exactly as it was obviously intended. The information security industry and academy readily accepted CESG people as very knowledgeable consultants (who clearly demonstrated not only their “leading” competence, but also their willingness to share even their failure experience). At a forum in Toronto, the two CESG bosses were even entrusted with chairing sessions and moderating discussions. (!)

A completely different effect immediately manifested itself, usually accompanying any cooperation with special services. This refers to all excess of secrecy, attempts to drown out even the already published research results.

The story about the CESG grand cryptographer's performance at the open symposium was extremely sparingly covered in the media, and the article and presentation slides about Soliloquy can be found on the Web only to those who very clearly know what they are looking for (on the ETSI website, where these files are exclusively located, direct links to them are not detected).

But the most unpleasant is otherwise.

If anyone interested wants to get acquainted with the very article of scientists of the open community, which greatly impressed the British intelligence service, it quickly becomes clear that it is not so easy to find it. This article is not only on the site of scientific preprints Arxiv.org, where for a long time, along with physicists and mathematicians, both computer scientists and cryptographers are published. It is also not on the specialized site of purely cryptographic preprints Eprint.iacr.org, owned by IACR, or the International Association of Cryptographic Research. Moreover, each of the authors of the article we are interested in has many other publications on this and the other or even both of these sites.

But there is not only the work we need. Strange, but true.
Worse, if you set off to search for a file on the researchers ’personal web pages on university sites, an ambush awaits there too. The most famous of the co-authors, Aleksey Kitaev, is famous as a superstar in the horizon of quantum computing, has only a purely tangential relation to cryptography, and does not accumulate links to files of his publications anywhere.

Another co-author, Sean Holgren, really known as a cryptographer, like many other researchers, used to be used to post links to his publications on a university web page. But it was precisely on the article we were interested in that this case suddenly stopped. For all previous articles, files are available, but for the right one - only the name. For all subsequent publications 2015-2016. not even a name. Although such works are found in preprint archives ...

A truly complete list of everything that was, is, and will even be done (with appropriate links to files) is found only on the site of the youngest of the co-authors - named Fang Song. But, significantly, not on his university web pages, but on his personal website FangSong.info. And even here strange losses are revealed. We still have the PDF file with the variant of the article we are looking for, however, links to about the same file, but with names like "full version" and "Arxiv.org" turn out to be broken, looping back to the main page. That is, the files were clearly laid out by the author, but even here - as on the ArXiv site - inexplicably disappeared ...
All “disappearances” of this kind (quite a lot of similar cases) can be considered only with a very naive and superficial view of things. Most often, the explanation of what is happening is already contained in the headings of the articles, where the authors (in accordance with the rules instituted by scientists for a long time) are obliged to indicate the sources of financing and grants for the money of which the studies were conducted.

Specifically, in our case, the sponsor of the uniquely outstanding article on the new method of quantum cryptographic attack is (surprise!) The US National Security Agency. Well, "whoever pays for it dances," as you know. It is clear that the authors of the study themselves are always interested in the wide dissemination of their results, but their sponsors often have directly opposite goals ...

The only dark and really important point that has not yet been covered in this entire story is this.

What can be the relationship between the new, very effective (and very impressive special services) algorithm for opening all kinds of cryptosystems using a hypothetical quantum computer, and the hasty steps of the NSA to remove (back in 2015-2016) from cryptography circulation on elliptic curves? The connection here, as it turns out, is completely direct. But in order to notice it, again, one must carefully monitor what is happening.

When, at the turn of 2014-2015, the open community just became aware of the post-quantum Soliloquy algorithm from the British intelligence service, its subsequent compromise and the parallel invention of quantum attack, one of the very competent and knowledgeable cryptographers, Dan Bernstein, made an interesting generalization:
https://groups.google.com/forum/#!topic/cryptanalytic-algorithms/GdVfp5Kbdb8

Comparing all the facts known at that time, Bernstein put forward the assumption that in fact the new quantum algorithm from Holgren, Fang Song (and the company) also indicates the path to significantly more powerful attacks using traditional classical computers.

Moreover, on the basis of well-known, but very vague comments by the British, Bernstein concluded that the British special services know this, but prefer to keep it secret from everyone ...

And we know what happened afterwards. A few months later, in August 2015, the NSA suddenly surprised the whole cryptographic world with its sharp rejection of ECC cryptography with a relatively short key length.

The only ones who were hardly surprised were probably the cryptographers of the British intelligence service.

Well, six months later, at the beginning of 2016, already in the open cryptographic community, at least two independent publications from scientific researchers appeared, which in the most general terms confirmed Dan Bernstein's assumption:

1) Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev. "Recovering Short Generators of Principal Ideals in Cyclotomic Rings." In Eurocrypt 2016;

2) Jean-François Biasse and Fang Song, "Efficient quantum algorithms for computing class groups and solving the principal ideal problem in arbitrary degree number fields". In 27th ACM-SIAM Symposium on Discrete Algorithms).

In other words, it has now been rigorously and for everyone shown that yes, indeed, the new purely “quantum” approaches to solving difficult cryptographic problems, in fact, can significantly reduce labor costs when breaking cryptoschemes using classical computers.

Specifically, nothing has been openly announced yet about compromising the ECC scheme.

Or maybe you don’t need to do this?
Let's think together whether this is beneficial to the one who is aware?

But this, it seems, is only a matter of time.
7  Bitcoin / Development & Technical Discussion / Re: I don't believe Quantum Computing will ever threaten Bitcoin on: December 26, 2020, 04:23:26 PM
OP's "don't believe" is a pure speculation at the moment. We know nothing about potentials of future technologies. If quantum computing become power enough to break the current ECDSA scheme and other algos involved then quantum resistant   cryptography will  take the place. The biggest problem  for scientists in the 17th century was how to clean the Earth from a layer of manure that (as they believe)  will cover it in 100 years. That  problem disappeared after the horses (- the main means of locomotions in that time) were replaced by steam and an internal combustion engines.
I think that post-quantum cryptography will take its place before quantum computers appear or not. The problem with elliptic curve cryptography is not that it can be broken, but that it is impossible to check the reliability of the elliptic curves we are forced to use. There is a lot of information on this subject from specialized sources, the main outcome of which is the fact that some elliptic curves proved to be unreliable, even though they were recommended by very influential, world-renowned organizations.
In addition, the existing cryptography on elliptic curves is based on unproven statement, on assumption, on hypothesis.
Another problem is that hackers do not break cryptography, but steal keys, cracking key infrastructure.
No one is paying attention to this. As long as it doesn't affect anyone personally.
And here quantum cryptography on the one hand solves all the problems of elliptic curve cryptography, but on the other hand does not solve the problem of key infrastructure compromise at all.
The solution of the future is keyless encryption technology. Such technologies, as far as I know, are already being developed.
Today, the main danger for hacking comes from artificial intelligence. And it is no longer theory, it is practice. There are already break-ins based on this technology. Keys and passwords are being compromised again. It was reported this month that more than one billion accounts could be hacked using artificial intelligence. Why? Because there's something to steal...
8  Bitcoin / Development & Technical Discussion / Re: I don't believe Quantum Computing will ever threaten Bitcoin on: December 26, 2020, 07:15:14 AM
I don't know how dangerous a quantum computer is, but I know how dangerous, even now, artificial intelligence, a system that supports password guessing!
Cybercriminals use artificial intelligence and neural networks to improve user password guessing algorithms. More traditional approaches, such as HashCat and John the Ripper, already exist and compare different variants of the password hash to successfully identify the password that matches the hash. However, using neural networks and Generative Adversarial Networks (GAN), cybercriminals will be able to analyze vast sets of password data and generate password variations that match a statistical distribution. In the future, this will lead to more accurate and targeted guessing of passwords and a higher chance of profit.

In a February 2020 clandestine forum post, we found a GitHub repository that has a password analysis tool with the ability to parse 1.4 billion accounts and generate password variation rules.
In addition, we also saw a post listing a collection of open-source hacking tools that have been cracked. Among these tools is AI-based software that can analyze a large set of password data from data leaks. This software ensures that it extends its ability to guess passwords by teaching GAN how people tend to change and update passwords.
9  Bitcoin / Bitcoin Discussion / Re: Keyless encryption and passwordless authentication on: December 26, 2020, 07:08:44 AM
gibberish thread. I wonder what scam its peddling on the backend?
Yeah, that's a lot of gibberish... The old concept keeps crumbling like sand...
Here's a recent gibberish: Developers of popular Android apps forgot to fix a dangerous vulnerability...
This year, Oversecured security researchers discovered a serious vulnerability (CVE-2020-8913) in the Play Core library, which allowed malware installed on users' devices to inject rogue code into other apps and steal sensitive data such as passwords, photos, 2FA codes and more.  Nothing about the topic of password-based security - doesn't that help your thinking go into a groove?
According to a scan conducted by Check Point, six months after the Play Core update was released, 13% of all apps on the Google Play Store were still using the library, and only 5% were using the updated (secure) version. Among the apps with the highest number of users who failed to update the library, Check Point identified:
- Microsoft Edge, Grindr, OKCupid, Cisco Teams, Viber and Booking.com.

You don't happen to have products from these companies. I mean on the devices you use when you work with cryptocurrency?
10  Bitcoin / Bitcoin Discussion / Re: How long will existing encryption last? on: December 26, 2020, 06:56:18 AM
This couldn't be a danger, in spite of the fact that there are various amazing supercomputers these days, encryptions are made in crypto to totally scramble information. I realize somewhat about hashing however I'm not a PC proficient individual. I accept, what we are utilizing are hashing calculations that principally not permitting the information to be decoded returning to its source. Also, that innovation makes it the most secure and solid for individuals. Before long, these ground-breaking supercomputers won't be centered around decoding previously existing information, yet principally to make more grounded encryption.
Supercomputers can only help those who attack cryptography (cryptanalysts) or your security (hackers). In addition to all of the above, you should understand that your security will be attacked not through hacking cryptography, but through hacking the systems that protect your crypto keys and passwords.
Today, artificial intelligence is beginning to serve hackers, fraudsters, and other security attackers, not the other way around. This is no longer a theory, but a statistic. For example, artificial intelligence picks up passwords to your account using your social graph.
Interesting question.
We all use cryptography, although we don't notice it, because it is built into our security systems, is inside them.
We also use keys to our ciphers, but we don't know them, we haven't even seen them.
The question is, if they were switched, with ones that someone else knows, would we be able to notice it?
That is the question, the answer to which can change the attitude to cryptography based on keys and to authentication based on passwords or other stable factors - as a vestige of old technology, as a source of potential danger, and not vice versa.  
11  Bitcoin / Bitcoin Discussion / Re: Keyless encryption and passwordless authentication on: December 11, 2020, 11:21:44 PM
gibberish thread. I wonder what scam its peddling on the backend?
It's the scam of the century. It's happening now. It's called encrypt your secrets with good cryptography, and we'll just steal your key. So statistics show that whoever has a key to keep for a long time is a profane.
Today we are all profane.
And for us, for the profane, there is gibberish, like security in cyberspace, which does not yet exist.
And then there's gibberish for those who look at things superficially.
Everyone has a choice.
The con is where one writes for the sake of writing and being a legendary and untalented writer on the forum.
And if there is a desire to think freely, to think, for the sake of interest and not just to write, then I will write the following for those.
The key is what opens the lock. If the lock is not changed for a long time, the key can be picked. Therefore, if the lock is not changed for a long time, the key should be as sophisticated as possible. If you change the lock sometimes, there will be less time to pick the key. And if the lock is changed very often, the complexity of the key will cease to matter and there will be no time to pick the key. And if you change it even more often... then you can refuse the pair lock-key at all, it is enough to change, to know the direction of opening of this door. For example, the door to yourself is "1", the door from yourself - "0". Imagine that we need to guess 256 openings and never make a mistake. We can only try once, there is no time for a second attempt. The gambler will say - you can try. The analyst will say - there is no point in trying, it is the same as guessing a key that is 256 bits long. It is not possible to guess, because this problem cannot be solved, even by a complete search, in polynomial time, not only with modern computing power, even those that can be predicted in the future. And in our example, there is no time at all, let us say conventionally, one second and only one attempt. These explanations are given to understand the level of complexity of the problem, and hence the reliability of encryption in such a concept.
12  Bitcoin / Bitcoin Discussion / Re: Keyless encryption and passwordless authentication on: December 11, 2020, 09:26:52 PM
Technological part.
Steamless symmetric encryption technology is based on the method of very fast change of encryption schemes, which are determined only in very short moments and are absolutely unpredictable for an external observer-analyst. The lack of the ability to attack the person in the middle (MITM) prevents key or password information from being compromised by users.
To fully implement the principle of fast change of encryption schemes, a vector-geometric encoding technology was developed based on fast and continuous change of virtual geometric space in a continuum with virtual internal time.
Such cipher code is reasonably resistant to cryptanalysis, brute force attack, especially given the rapid emergence of quantum computers. The keyless cipher code is absolutely resistant to Chosen-plaintext attack (CPA) attacks based on comparing the selected open text with the cipher code, without the possibility of violating the integrity of the open message, hidden modification, even at the level of one bit of information, and special (attack), and "noise" origin.
Instant and continuous verification of any volume of transmitted (or received) information.
  A channel watcher has no possibility to know:
 1) who transmitted (or received from whom) the information;
 2) how much information is transmitted and/or received at all or per session;
 3) whether there was any information exchange between users at all;
 4) all pauses of the "silence" moments of the interlocutors, of any duration, are filled with fake data, which are encoded in the same way as an open message.
13  Bitcoin / Bitcoin Discussion / Re: How long will existing encryption last? on: December 11, 2020, 09:11:26 PM
This couldn't be a danger, in spite of the fact that there are various amazing supercomputers these days, encryptions are made in crypto to totally scramble information. I realize somewhat about hashing however I'm not a PC proficient individual. I accept, what we are utilizing are hashing calculations that principally not permitting the information to be decoded returning to its source. Also, that innovation makes it the most secure and solid for individuals. Before long, these ground-breaking supercomputers won't be centered around decoding previously existing information, yet principally to make more grounded encryption.
You are wrong if you think that supercomputers and other technical innovations can improve the quality or reliability of encryption.
Good cryptorgery is not a technology and technique, but mathematics and the thoughtfulness of a system that creates a cipher on paper. This is theory and science, not a supercomputer.
14  Bitcoin / Development & Technical Discussion / Re: I don't believe Quantum Computing will ever threaten Bitcoin on: August 19, 2020, 11:52:25 AM
I think that anonymity of a bitcoin owner and guessing or calculating a bitcoin address are different things.
No matter what bitcoin address, I'm far from the idea that a self-respecting hacker will pick up the code to get the hash sum. If I wanted to calculate the owner of a bitcoin, I would have done it through calculating the client's IP. If I knew one or the required set of bitcoin owner IP addresses, I would attack the owner with special software, I don't want to advertise bad things, so I don't name which one.
Hi.
Such turnkey software has already appeared a lot, starting from buying components just in the network and ending with the purchase of ready-made complex solutions, which can use even a child. Probably after 24 hours, I would see which keys of the keyboard (both physical and screen) my attacker presses, and even where he drives the mouse on the screen. I think, but I don't know, the whole financial part of the attack would take me $1,500. If the attacker has a financial interest for the hacker, then it is a matter of technique and ingenuity, not quantum computers and code brute force attack.
Hackers are a thinking people, unlike many network users. If only there was a point...
15  Bitcoin / Development & Technical Discussion / Re: I don't believe Quantum Computing will ever threaten Bitcoin on: August 17, 2020, 08:02:37 PM
Yes, I don't believe that quantum computing is dangerous right now. However, progress does not stand still if Bitcoin is now a powerful source of power for many social networks. Since it allows you to transfer amounts anywhere, and at the same time allows you to control your money, ensuring you complete safety. But this does not mean that in 20-30 years it will be as safe. What we could not even imagine could happen. Even now, more and more powerful advanced models are being created, which (maybe) will be further refined and evolved in the future. So in the future, there is a risk that bitcoin will not be so secure. Huh Huh Roll Eyes
-----------------
Bitcoin will always be safe because it's based on good cryptography. In other words, cryptography, as a science and as a practice, is already 100 years ahead of technical progress. But these achievements have not yet been used. There's no need to. As soon as there is a need, these new cryptographic systems will be introduced immediately into bitcoin. The danger of bitcoin is completely different - it's not anonymous at all. If desired, all bitcoin owners can be identified. And only you will be identified, making a targeted attack will not be a problem.  A trained attacker will no doubt steal your keys. He'll take your bitcoins without hacking into the cryptography. You don't have to think about the security of your cryptography, no fools to break it, but about your anonymity on the network. Here's the big problem. And I don't know how to solve them. VPN or Tor don't solve them. Only an anonymous operating system...
16  Bitcoin / Bitcoin Discussion / Re: Keyless encryption and passwordless authentication on: August 14, 2020, 06:29:29 AM
Is this method so safe? For some reason, I'm not sure.
--------------------------
In a keyless system that does not have a key, but has a continuously changing set of encryption schemes, it is necessary to perform exactly the same task for absolutely every data packet with a volume of 256 bits.
Why?
Because for any and every 256-bit message, one unique encryption scheme is used (in fact, this is a unique set of encryption schemes and rules).

Consider attack resistance.
First. If the message contains only 10 data packets of 256 bits each, this is 10 times 2256 bits of information, then a brute force attack will have to be carried out absolutely on each data packet.
Mathematically, this means that with respect to the key encryption model, the task becomes more complicated as many times as there are data packets (256 bits each) a message contains.
Second. In contrast to the key encryption model, in a keyless system, the hypothetical positive result of a successful brute-force attack of any number of data packets (256 bits each) does not help to solve the problem of decrypting other data packets that make up this message.
Third. Thus, a rough search will have to be done for each data packet from the available set. If G is the minimum number of data packets, adding up which it is possible to unambiguously understand the open message, then the exhaustive search problem will look like this: it will be necessary to check 2 to the power (G * 256) options. The possibility of attacking such numbers needs no comment, it is utopia by definition for any high technological level of attackers.
 Fourth. Any model of keyless encryption, technologically, must have the function of "encryption of silence", which simulates the exchange of cipher codes of open messages in this closed communication channel. If this function is there, therefore, you can use it as many times as necessary. This means that the number of packets that must be simultaneously decoded to understand an open message can be any large, regardless of the minimum size of the open message itself. How to solve the problem of breaking a cipher with such an additional condition? I can not imagine.
17  Bitcoin / Bitcoin Discussion / Re: How long will existing encryption last? on: August 13, 2020, 06:58:42 AM
The Office of Advanced Research Projects of the U.S. Department of Defense (DARPA) has signed a contract with ColdQuanta to create a new quantum computer.
As we were informed, the construction of a quantum computer for 1000 cubic meters will be possible in the next 40 months.

According to Bo Ewald, CEO of ColdQuanta, within the next 40 months, under the terms of this contract, a machine will be created which will consist of 1000 (one thousand!!!!) cubic meters, and it will be able to make the necessary calculations ... to create the drugs and... (it's not interesting and probably not true that it will be used for this) - and to break the ciphers.

All this suggests that users of today's asymmetric key cryptography have less and less time left. I don't think 1000 kbit will be able to crack a key longer than 2000 bits, but I think 10,000 kbit will appear after a 1000 kbit quantum computer. That's the problem.
In 40 months, the era of quantum cryptography for a strong world and keyless encryption for ordinary people will begin.
If there is much talk about quantum cryptography, then keyless encryption methods are considered fiction and not worthy of public attention.


Is it really possible to have that kind of computers that could do so much cryptography? Really our world now are going through so much in computerization and it will be a matter of fact when all of the advance technology will become more advance. We had already seen heart transplant in medical and there is also a study about head transplant. I do not know if it was being successful but it is indeed true that a certain man who is sick and had having hard time on his condition made him decide to volunteer for the said experiment.

Computerization is really great and hoping that it will be apply to do things for comfort and not just creating it by the purpose of doing evil things.

-------------------
In fact, no matter how much computing power a person invents, no matter how fast the computer that will be used to break cryptography, this battle will always be won by cryptographers, because mathematics is endless now, it can work with any numbers. And technologies are always finite for the present moment in time, so they are always limited in their capabilities.
I pay attention to modern cryptography, and raise the topic of its long or short life, precisely from the point of view of the availability and use of keys for encryption. No matter how perfect cryptography is, the presence of a key always instantly weakens it to zero in the event of an attack. All modern attacks are attacks to steal keys and passwords. And not a single attack from fraudsters - not on cryptography.
All talk about the threat of quantum computing is a false trail.
All conversations should be about how to protect the user from theft of keys, passwords, phishing.
It is this vector - no one discusses or, in the best case, offers "password managers" or two-factor authentication. And that and that way is a utopia, and cyber defenders pumping money out of users. This is their way of being and, moreover, forever. They do not offer a solution to the problem at the root, but polish an outdated mechanism.
I suggest looking the other way.
We need cryptography without a key and authentication without a password, and this means the main thing - without any permanent, long-assigned digital identifier.

Although many of my posts were deleted by the administrator, something remained here, this is the topic I'm trying to discuss there:
https://bitcointalk.org/index.php?topic=5204368.60
18  Bitcoin / Bitcoin Discussion / Re: Keyless encryption and passwordless authentication on: August 13, 2020, 06:43:58 AM
All modern cryptography is built on the same principle: the encryption scheme is defined by the key. And even if the cryptography itself is "conditionally reliable" or absolutely reliable (Vernam's ciphers), the fact of having a key will always be a natural vulnerability, which will be actively exploited by fraudsters in the first place. It is this vulnerability factor that instantly, irrevocably, completely levels out and weakens to zero any most reliable cryptographic system. Moreover, it has fatal consequences if the fact of compromising key information remains a mystery to the attacker. For this reason, all new post-quantum encryption systems, any key encryption technology, all the latest security systems of tomorrow will be no exception.
Any security system, a security protocol based on cryptography with a mandatory key function, will be attacked first, through the encryption keys, through its weakest point.
19  Bitcoin / Development & Technical Discussion / Re: I don't believe Quantum Computing will ever threaten Bitcoin on: August 13, 2020, 06:36:10 AM
Yes, I agree, video understandable, the idea of curvature of our space-time is old as the world. I don't understand why passing near a massive object a ray of light has exactly such curvature as in the picture - deviates from the mass. By the way, it completely contradicts the behavior of objects in the video you provide.
About the mass.
Curvature is good, but it's only a way to talk about it.
I cannot but confirm that these questions are better known to the creator of our world, if he himself has not forgotten what he did.
But the photon beam itself - it has a mass, and completely independent of the so-called curvature of space-time. That is why the heated gas in a closed measuring system - has its own weight, which increases with increasing temperature. Because as the temperature increases - there is an increase in the flow of photons of infrared radiation in the closed system. A closed system is one in which the photons do not fly out, but are reflected and remain inside (Thermos).  Temperature rise - is an increase in the flow of photons, an increase in their number. That is why the mass of such a system, when heated, will increase.
I think a photon has a mass of motion...
The fact that time and space are one continuum is only a hypothesis.  That hypothesis has a lot of evidence. But the opposite hypothesis that time and space may sometimes be not in phase, not in such a single and indivisible continuum as we think, also has no evidence to disprove it.
An electromagnetic wave is also a continuum of electric and magnetic fields. But, in the absence of oscillations, an electric field can successfully exist without a magnetic one.  And there is no continuum! It's broken.
This indirectly confirms that the continuum also has its own time-space (a more correct definition than space-time, in my humble opinion) oscillations which we do not notice while we are inside this medium. Probably, this continuum can be as broken as any other. Nature is infinite and does not like the limitations of its manifestation.
An example in support of this view.
The theory of black hole existence. A place where gravity is enormous. Time increases (let us define that when time slows down in relation to our reference system, it means that time as a parameter of the length of events increases (!!!), and not vice versa, it is very important not to confuse and not to give in to the opinion of one's "common sense", science has often proved that it is "common sense" that is false), and space in these conditions decreases.
Let's check it out.
The rate at which any object falls under these conditions relative to us seems to be decreasing. The object is slowing down. That's because there's more time than we have. Let's see: velocity V is distance / time. That's right, only in this concept of time and space evaluation, speed V by its formula tends to zero relative to our reference system. The object will never fall to the surface of a black hole, it will seem to us that it has stopped. Yes, I know the surface of a black hole isn't, that's the way to talk.
On the other hand, if we fell to the center of the black hole and were alive, we would see our universe moving faster and faster and all the stars flying apart at increasing speed, our solar system dying, new ones forming... Here's the continuum, clap and it's gone.

It turns out that the places where there is no gravity are places where time flows as slowly as possible and space is enormous. That's why there's a constant of maximum speed in this environment - the speed of light in a vacuum, but now you have to add it immediately:
1) in the place with the least gravity;
2) and immediately add - for our reference system, which is also in the place with the smallest gravity.
Here is what is not in the formula for the speed of light - no relativity itself.
If we were in a place with strong gravity (in a black hole), the speed of the same light - would be for us completely different, larger, huge, any.

Old Einstein was right to say that speed is relative. He was right to say that no other object in our world can move faster than the speed of light. But he didn't agree that this is under the condition that the gravitational field in the place where light moves and where we observe and measure it from. 
After all, speed is the ratio of two components of the continuum time/space: and space (distance) / time (length of event) - both there, in the formula for speed. And both of these parameters are not constant in nature.

And there are suspicions that gravity not only curves space-time, to be more precise, in my terms, violates the conditions of their inviolable continuum, but is also a clear characteristic of our world and, therefore, when it changes - a passage to other worlds.
20  Bitcoin / Development & Technical Discussion / Re: I don't believe Quantum Computing will ever threaten Bitcoin on: August 12, 2020, 01:21:23 PM
Please specify one thing. In the picture in the past, you can see that the beam from the star, passing near the star (the sun probably) - repulses. Is it?
I've always thought that large gravity objects attract a flow of photons to them, that's how gravity works in our everyday experience. That is why an electromagnetic wave (a flow of photons) cannot break out of the horizon of the black hole events.
I think the essence of space curvature by gravity in the picture is wrongly depicted.

And I want to note that the substitution of words:
1. two objects having mass - are attracted to each other or 2. the space around the massive object is curved and therefore the straight beam of light is also curved = identical, and do not explain the essence of the phenomenon of gravity. It's just a way of saying things differently, no more.

If in electromagnetic interaction there is a rule of attraction of differently charged particles and a rule of repulsion of equally charged particles, we intuitively want to use the discovered effect - on gravity. It's not only that objects absolutely identical to the atom can be attracted, but also different physical essence of the physical value "object mass" and gravitational attraction between objects - is present!  Mass is not identical to gravity, but these two phenomena always go hand in hand. Plus there is no possibility to make a gravitational insulator, and in electromagnetism it is possible.

And what's more interesting is that gravity reigns in the macro world.
In the microcosm, electromagnetism is at the level of the atom. There's nothing worth gravity. The whole substance surrounding us is of electromagnetic nature, plus virtual (I called them so here, this is my opinion) forces of weak and strong interaction, which are also a way to discuss the observed, not tools to understand it or notions that explain anything. Scientist sees that the atomic nucleus is held by something, so there is a force. Whatever you want to call it, it's what you want to call it. We transfer Newton's macrocosm laws to the microcosm. Force, acceleration, and speed itself are not very convenient concepts for the microcosm, where all objects are blurred in space and in essence are not defined by coordinates and there is no possibility to simultaneously measure both their coordinate and their physical parameters. Either that or that. How can we afford the observed effect of holding the components of the atomic nucleus together - the effect of strong or weak interaction? And add the term "force" to that. This is not the case when there is an object to which one can apply force and get acceleration. It's a microcosm. Everything there is dual (two or more have meanings, everything is not unambiguous) and uncertain. The most important thing is discretely space (distance) itself, energy (Planck's constant), mass (a multiple of God's Higgs boson), spin, electric charge, and I suspect time. Well, anything you don't take has no smooth nature. There's stairs everywhere!!!

That's why I didn't study the physics of the microcosm, that I didn't agree with the approach that science takes from the beginning. It seems to me that the microcosm is much thinner and more intellectual than the laws of our macrocosm and its view of nature. That's right, philosophy...
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!