(no subject)
Oct. 15th, 2015 11:25 amFuck.
Short version: cracking D-H key exchange ("most internet encryption") by brute force when every site uses a different 1024-bit key is unfeasibly hard. But if people are using the SAME 1024-bit key, instead of needing to crack 2^1024 (a number 309 digits long) keys, you just need to crack that one. And that only costs a few hundred million dollars, a year of time, and the knowledge of which 1024-bit key to crack. Guess what most common TLS and SSH implementations do? They use a specific key across all installations, which can be pulled out of the installer.
So it's believed that the NSA have cracked the specific keys used by lots of common software, which lets them read the encrypted traffic sent to and from those programs.
Short version: cracking D-H key exchange ("most internet encryption") by brute force when every site uses a different 1024-bit key is unfeasibly hard. But if people are using the SAME 1024-bit key, instead of needing to crack 2^1024 (a number 309 digits long) keys, you just need to crack that one. And that only costs a few hundred million dollars, a year of time, and the knowledge of which 1024-bit key to crack. Guess what most common TLS and SSH implementations do? They use a specific key across all installations, which can be pulled out of the installer.
So it's believed that the NSA have cracked the specific keys used by lots of common software, which lets them read the encrypted traffic sent to and from those programs.
(no subject)
Date: 2015-10-15 03:40 pm (UTC)(no subject)
Date: 2015-10-15 03:52 pm (UTC)(no subject)
Date: 2015-10-15 08:17 pm (UTC)(no subject)
Date: 2015-10-15 08:56 pm (UTC)They always have acted that way, even when horse travel was the norm. Why stop now?
(no subject)
Date: 2015-10-15 08:58 pm (UTC)(no subject)
Date: 2015-10-15 09:10 pm (UTC)(no subject)
Date: 2015-10-15 03:44 pm (UTC)(no subject)
Date: 2015-10-15 03:55 pm (UTC)If you have nothing to hide ...
Date: 2015-10-15 05:19 pm (UTC)(no subject)
Date: 2015-10-15 09:03 pm (UTC)I've always been fascinated, therefore, with the encryption techniques that happen in normal-looking communications. If you don't know there's a secret surprise contained within that mp3 of Metallica covering Queen or of that selfie taken outside the Taj Mahal, why would you try to crack it?
There, I think, will be the next avenue of secret comm, now that just about everyone has the bandwidth to send silly pics and songs.
(no subject)
Date: 2015-10-15 09:13 pm (UTC)Its pretty similar to logjam - in that you can pre-compute a large part of the factorisation. His opinion is that anyone who's been using 1024 bit DH is asking to be fucked - and has been for a while (against government actors).
Comments in that thread basically state we've known most 1024 bit shit has been vulnerable since 2006 or so.
(no subject)
Date: 2015-10-15 09:27 pm (UTC)[1]: Unless it's "64" or "32" in which case NO WRONG THIS IS NOT 1990 YOU FOOL but we're not talking about 32 or 64, we're talking about 256 in some cases, 1024 or 4096 in others.