[Cryptography] new wiretap resistance in iOS 8?

Ryan Carboni ryacko at gmail.com
Tue Sep 30 22:50:10 EDT 2014


>
> >* When it was approved
> *>* in 1976, it's not clear even NSA could muster the hardware for a
> *>* brute force attack; in fact, I'd guess not.  The first *public*
> *>* attack wouldn't come until 1999 - 23 years later.
> *
> Actually, Diffie and Hellman published their design for a
> custom-hardware DES-cracker in 1977:
>   Whitfield Diffie and Martin E. Hellman
>   "Exhaustive Cryptanalysis of The NBS Data Encryption Standard"
>   IEEE Computer, June 1977, pages 74-84,
>   http://www.computer.org/csdl/mags/co/1977/06/01646525.pdf
>
> Their paper makes fascinating reading even today.
>
> Their design could search the entire 2^56 DES keyspace in about a
> day (mean time to solution about 12 hours), at a capital cost which
> they estimated at about $20 Million (using 1976 hardware technology).
>
>
You know the funny thing is, we'd still be using DES today if they used a
64-bit key. By '84 they'd be able to start bruteforcing it, and in
mid-2005, there'd be an AES competition. But there'd be a large probability
that everyone would be using 64-bit keys as a result of obsolete browser
settings.

 Instead everyone is increasingly using large-key crypto that the NSA
cannot break. But the NSA still finds other ways. Stuxtnet was one way. I
guess we shouldn't use USB anymore.

I wonder if the government ever looks to the future. They're supposed to,
roads don't yield dividends immediately, and neither does bonds.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20140930/152374c5/attachment.html>


More information about the cryptography mailing list