Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Swordmaker
Hello, I'm aware of numerous methods used for both encryption and decryption, Most are in the public domain some not so public. I merely posted an example article to illustrate that the algorithms used are not as secure as we think to those with time and money and smarts including those based on elliptic curves. A lot of time has passed allowing numerous and voluminous pre-calculations if you know what I mean. I'm no expert but I have stayed at a holiday in near Ft. Meade!

The apple phone I believe is encrypted with a block AES-256 bit hardware S-box. Given the repeating opcodes and and addressing modes and other structures within a computers memory It shouldn't be to difficult if one has physical access to the phone ( or ssh wink wink nod nod say no more say no more ). A simple search will show that current research believes that AES-256 is less secure than AES-128.

Friends make arrangements for one time pads!

When I was in grad school and we had to give a monthly presentation of our work, when we didn't fully know and/or understand what we were talking about we called it our monthly stand-up, turn around and speak out your arse session. The profs just liked a good laugh!

Truth to me is that this event is indistinguishable from propaganda and we may know the truth in 20 to thirty years. Some of use may know sooner than others ;)

148 posted on 04/01/2016 4:06:41 PM PDT by lurked_for_a_decade (Imagination is more important than knowledge! ( e_uid == 0 ) != ( e_uid = 0 ). Read source code!)
[ Post Reply | Private Reply | To 123 | View Replies ]


To: lurked_for_a_decade
A simple search will show that current research believes that AES-256 is less secure than AES-128.

That's totally bogus. Reading the search results you find they all debunk that claim. The researchers point out that Grover's Algorithm applied to AES 256 would result in two AES 128 encryptions but that the hardware to do that simply doesn't exist and it's doubtful it ever will, while the Quantum hardware to apply it to AES 128 to convert it to two AES 64s does. The other point is the are talking about COMMUNICATIONS AES and linear encryption. The following is from a cryptographer forum of just a few months ago:

It shows there exists an attack that works on a weakened version of AES-192 and AES-256.

The best attack on AES-256 is still brute force.

Maybe someday there will be an attack faster than brute force on AES-256 (all 14 rounds), but that hasn't been shown yet.

and they are still not discussing elliptical encryption techniques.

The reason that AES 128 is still used for communications in banking, financial, and even government uses is that it's still good enough and it's fast. AES 256 handshaking takes too damn long.

Friends make arrangements for one time pads!

Communications. . . again.

149 posted on 04/01/2016 5:19:40 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 148 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson