Bitcoin Forum
May 27, 2024, 11:59:17 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Cryptographic "breakthrough" by NSA?  (Read 7808 times)
charleshoskinson
Legendary
*
Offline Offline

Activity: 1134
Merit: 1008

CEO of IOHK


View Profile WWW
June 07, 2013, 11:29:18 PM
 #21

And no one remembered to mention DES? Shame on you for your limited historical scope.

The revolution begins with the mind and ends with the heart. Knowledge for all, accessible to all and shared by all
charleshoskinson
Legendary
*
Offline Offline

Activity: 1134
Merit: 1008

CEO of IOHK


View Profile WWW
June 07, 2013, 11:43:39 PM
 #22

Quote
How about clipper then? Actually with DES the story is quite telling and pretty much in line with "store for now, crack later" point.

When IBM and NSA negotiated about "backdoor" into DES IBM wanted 64 bit key, NSA wanted 48 bit, in the end they agreed on 56 bit. Reportedly NSA could not break it just yet but fully expected to be able to do so a few years down the road. This is the modus operandi.

That was my point, thank you Vlad.

The revolution begins with the mind and ends with the heart. Knowledge for all, accessible to all and shared by all
Jace
Sr. Member
****
Offline Offline

Activity: 288
Merit: 251


View Profile
June 08, 2013, 12:04:39 AM
 #23

the NSA released SHA256 according to wikipedia. The NSA never endorses anything that they can't themselves decrypt, ever.
NSA is unable to decrypt SHA256, because there is nothing to decrypt. Simply is no such thing. SHA256 has nothing to do with encryption whatsoever.

You seem to confuse encryption and decryption with hashing (which is just a checksum that works one-way by definition).



I thought I read something about a breakthrough they had where they could emulate the entire range of SHA256 hashes. That was a really long time ago though. I probably misunderstood it though, as it was years ago.
I doubt that very much. You know there are 2256 such hashes? See here:
(click=large)
 
So if "emulate" means even as much as just counting them, then no.

Feel free to send your life savings to 1JhrfA12dBMUhcgh85wYan6HL2uLQdB6z9
charleshoskinson
Legendary
*
Offline Offline

Activity: 1134
Merit: 1008

CEO of IOHK


View Profile WWW
June 08, 2013, 12:10:50 AM
 #24

Jace is correct in his assumption and statement. The NSA uses SHA256 hashes in its suite B protocols http://www.nsa.gov/ia/programs/suiteb_cryptography/ that are used for secure communications for other government agencies. It would be a terrible idea for any government agency to transmit information from a protocol that is known to be broken.

I am not aware of a good hash collision attack for SHA256 nor any work that introduces a significant flaw in the scheme.

The revolution begins with the mind and ends with the heart. Knowledge for all, accessible to all and shared by all
JoelKatz
Legendary
*
Offline Offline

Activity: 1596
Merit: 1012


Democracy is vulnerable to a 51% attack.


View Profile WWW
June 08, 2013, 12:15:43 AM
Last edit: June 08, 2013, 02:28:11 AM by JoelKatz
 #25

The NSA never endorses anything that they can't themselves decrypt, ever.
That is true for algorithms they can put backdoors in (where it's obvious to everyone that it's possible the NSA could have done so because the constants are "magic"). But it is not true for public algorithms (like SHA256, RSA, and so on) where the constants have known derivations. If the NSA can break it, they know that other intelligence agencies can too, and they can't get the public to change algorithms often. US companies have the most valuable intelligence. Such a strategy would be most unwise.

Update: And what oakpacific said below me.

I am an employee of Ripple. Follow me on Twitter @JoelKatz
1Joe1Katzci1rFcsr9HH7SLuHVnDy2aihZ BM-NBM3FRExVJSJJamV9ccgyWvQfratUHgN
oakpacific
Hero Member
*****
Offline Offline

Activity: 784
Merit: 1000


View Profile
June 08, 2013, 02:25:42 AM
 #26

Seriously, get a clue, there is no such thing as "breaking" SHA256, other than quick collison finding, which will only affect address hashing(can be updated to something theoretically unbreakable), and most certainly it doesn't affect mining at all.(to quote Gavin, we would have been just fine using MD5).

https://tlsnotary.org/ Fraud proofing decentralized fiat-Bitcoin trading.
charleshoskinson
Legendary
*
Offline Offline

Activity: 1134
Merit: 1008

CEO of IOHK


View Profile WWW
June 08, 2013, 02:36:03 AM
 #27

Quote
Seriously, get a clue, there is no such thing as "breaking" SHA256, other than quick collison finding, which will only affect address hashing(can be updated to something theoretically unbreakable), and most certainly it doesn't affect mining at all.(to quote Gavin, we would have been just fine using MD5).

But what about my rainbow tables.......


The revolution begins with the mind and ends with the heart. Knowledge for all, accessible to all and shared by all
oakpacific
Hero Member
*****
Offline Offline

Activity: 784
Merit: 1000


View Profile
June 08, 2013, 02:46:16 AM
 #28

Quote
Seriously, get a clue, there is no such thing as "breaking" SHA256, other than quick collison finding, which will only affect address hashing(can be updated to something theoretically unbreakable), and most certainly it doesn't affect mining at all.(to quote Gavin, we would have been just fine using MD5).

But what about my rainbow tables.......



That's the whole point, it has nothing to do with all the easy collision-finding algorithms you can come up with.

https://tlsnotary.org/ Fraud proofing decentralized fiat-Bitcoin trading.
MysteryMiner
Legendary
*
Offline Offline

Activity: 1498
Merit: 1038


Death to enemies!


View Profile
June 08, 2013, 05:10:46 AM
 #29

Quote
Cryptographic "breakthrough" by NSA?
Yes, they finally broke the CD-ROM tray of cryptographic computer using brute force attack.

Realistically they could with such datacenter:

1. Collect unencrypted communications from every source available and then run trough "intellignet" search to find communications that require closer attention by human spy piece of shit.

2. Have copy of certificate authority private keys to silently do MITM attacks with their own certificates. This might be that "breakthrough" article is about. Then feed the "encrypted and then decrypted" communications in step 1.

3. Collect and store everything about everyone to later blackmail persons of interest or to know who to send to death camp first. Stalin did that to his closest comrades, why capitalist pigs cannot do the same?

bc1q59y5jp2rrwgxuekc8kjk6s8k2es73uawprre4j
salfter
Hero Member
*****
Offline Offline

Activity: 651
Merit: 501


My PGP Key: 92C7689C


View Profile WWW
June 08, 2013, 08:52:59 PM
 #30

the NSA released SHA256 according to wikipedia. The NSA never endorses anything that they can't themselves decrypt, ever.

SHA-256 is a hashing algorithm, not an encryption algorithm.  The most you can do to compromise a hash is to find a way to create a hash collision, as happened with MD5 a while back.  While it's possible the NSA withheld such a method from release, that they released the algorithm as open source makes backdoors less feasible.

Tipjars: BTC 1TipsGocnz2N5qgAm9f7JLrsMqkb3oXe2 LTC LTipsVC7XaFy9M6Zaf1aGGe8w8xVUeWFvR | My Bitcoin Note Generator | Pool Auto-Switchers: zpool MiningPoolHub NiceHash
Bitgem Resources: Pool Explorer Paper Wallet
lukyforvar
Hero Member
*****
Offline Offline

Activity: 804
Merit: 1002



View Profile WWW
June 08, 2013, 09:16:56 PM
 #31

there is no freedom in the country of freedom

Bitcoin, the weapon of freedom massive.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!