Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Reading al Qaedas Encrypted Email
Strategypage ^ | August 5, 2004 | James Dunnigan

Posted on 08/04/2004 11:09:02 PM PDT by Straight Vermonter

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 last
To: proxy_user

How does the computer recognize when the correct key has been used, and a valid result has appeared?


I believe that Blenchley Park solved that problem with "The Bomb". They knew the constraints on enigma machine, they had an electro-mechanical computer that would brute force possible combinations until plain-text German appeared in short snippets. It could false alarm, but just reset and continue.


41 posted on 08/05/2004 1:40:07 PM PDT by Lonesome in Massachussets (Take Luca Brazzi, make him an offer he can't refuse.)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Flightdeck
That would be a 1 followed by 77 zeros. Just like 1 times 10^2 is a one followed by 2 zeros.

D'oh!

Sigh, it was the wee hours of the morning, and I've spent a lot of time correcting people who say that 10X is "10 followed by X zeros", when it's really X-1. So I was primed to make the reverse mistake myself out of habit. :-)

42 posted on 08/05/2004 2:05:37 PM PDT by Ichneumon ("...she might as well have been a space alien." - Bill Clinton, on Hillary, "My Life", p. 182)
[ Post Reply | Private Reply | To 40 | View Replies]

To: ScuzzyTerminator; Lonesome in Massachussets; cryptical

I agree it is not a hard problem. My point is speed. How many machine cycles will be needed to test each decryption for plaintext? If you're trying to test a billion keys per second, this definitely becomes a consideration.

There would be many ways around brute-force recognition algorithms for skilled operatives. For example, you could write you text in a graphics application, and save it as a .jpg. Then uuencode it or yenc it to disguise the filetype, and apply your encryption algorithm. The brute-force cracker cannot be programmed to recognize to many variants without slowing it down so much that it would be worthless.


43 posted on 08/05/2004 2:21:11 PM PDT by proxy_user
[ Post Reply | Private Reply | To 35 | View Replies]

To: proxy_user

I think the point is that even things like that have headers in them, which would make them even easier to decrypt and recognize. Besides, AQ don't want to be slowed up, they just wanna fire off emails without all the rigamarole.


44 posted on 08/05/2004 2:26:43 PM PDT by Lonesome in Massachussets (Take Luca Brazzi, make him an offer he can't refuse.)
[ Post Reply | Private Reply | To 43 | View Replies]

To: proxy_user
How many machine cycles will be needed to test each decryption for plaintext?

I doubt that the NSA would use CPUs to crack well known algorithms. I assume they use hardware designed for the task, like the EFF DES Cracker project. The "randomness meter"  would likely be a module that works in parallel without slowing anything down.

There would be many ways around brute-force recognition algorithms for skilled operatives. For example, you could write you text in a graphics application, and save it as a .jpg. Then uuencode it or yenc it to disguise the filetype, and apply your encryption algorithm.

Steganography before encryption doesn't help because you know you found the key when you've found, for example, a .jpg  or a uuencode. Generally, you need to encrypt before you hide.

The brute-force cracker cannot be programmed to recognize to many variants...

Variants don't matter. You're not looking for recognizable data patterns but just measuring randomness. Any message with meaningful information, no matter what the format, will be manifest as non-random if you have a sample at least as big as the unicity distance.
45 posted on 08/05/2004 6:33:43 PM PDT by ScuzzyTerminator
[ Post Reply | Private Reply | To 43 | View Replies]

To: Finalapproach29er
This fool should shut his mouth, or have it shut for him.

Nah. This article is mostly just speculation. If the NSA is reading the PGP messages from al Qaeda laptops, it's most likely that it is because they have the 'secret key', and it is protected with a weak password rather than a brute force attack. People are generally pretty stupid when it comes to passwords, which is one reason that PGP always says "pass phrase" in its documentation. MY pgp pasphrase is more than 40 characters, but few people go to such lengths because they simply don't understand the concept of the "weakest link". If the NSA has posession of the encrypted message (cyphertext), the public key, and the private key, it should be obvious that they'll attack the private key because it is the "master" that enables them to decrypt messages at will.

It used to be that the NSA had the best crypto folks on the planet, and while this might still be true to a degree, there are a heck of a lot more high-quality cryptographers out there in the world at large than there used to be.

I'd still bet that absent physical posession of the secret keys, PGP is probably still opaque to the NSA. That's one reason why it is so important to safeguard your keys.

Even without the ability to decrypt messages, traffic analysis is a useful tool in building information about networks of people. Knowing that Alice, Bob, and Chuck are communicating with a bunch of encrypted messages acn tell you a lot about relationships.

I support the universal use of encrypted mail. Unfortunately, most people can't be bothered. They'd rather send their messages on postcards than protect them with an envelope.

46 posted on 08/05/2004 6:49:15 PM PDT by zeugma (The Great Experiment is over and the Constitution is dead.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Ichneumon
If every single atom in the universe were a computer a trillion times faster than the fastest computer today, and ran for a trillion years, you still wouldn't have enough computer power to crack a single 2048-bit key by brute force.

I call keys like that 'heat death' keys, because they'll take longer to decrypt than the ultimate fate of the universe.

47 posted on 08/05/2004 6:52:10 PM PDT by zeugma (The Great Experiment is over and the Constitution is dead.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: zeugma

The more basic question: Why announce it and let them know we can read their mail?

I don't understand the need to tip off the enemy when we succeed at gathering info.


48 posted on 08/05/2004 7:10:48 PM PDT by Finalapproach29er ( Election day: FOUR Supreme Court Justices! Enough said.)
[ Post Reply | Private Reply | To 46 | View Replies]

To: Finalapproach29er

Oddly enough, AQ continues to use satellite phones, even though the CIA owns the satellites. My guess is that NSA can read PGP. All encryption systems have vulnerabilities, fatal ones if you get your hands on even one machine in the chain of communication.


49 posted on 08/05/2004 7:19:33 PM PDT by js1138 (In a minute there is time, for decisions and revisions which a minute will reverse. J Forbes Kerry)
[ Post Reply | Private Reply | To 3 | View Replies]

To: VOA

THX. Will try and check it out.


50 posted on 08/05/2004 8:09:57 PM PDT by Quix (PRAYER WARRIORS, DO YOUR STUFF! LIVES AND NATIONS DEPEND ON IT)
[ Post Reply | Private Reply | To 2 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson