I read this story and was immediately reminded of the 1968 Dirk Bogarde film "Sebastian". The correct time index is 30m 48s, in case the URL parameter doesn't work as intended.
Announcement
Collapse
No announcement yet.
Developer Claims: "A New, Fast & Unbreakable Encryption Algorithm"
Collapse
X
-
Directed by David Greene. For more rarities not available on DVD, visit rarefilmm.com
- Likes 1
-
Originally posted by wodencafe View Post
The FOSS Community does a lot of catering to 5 year olds and White Knights.
Maybe you prefer it that way?
Comment
-
Originally posted by profoundWHALE View PostAFAIK, it was cracked quickly by a very slow machine because it only had to crack repeated words that it knew would be there, and then they would get the correct sequence to decode the messages. But, what if while trying to crack it, the message changes due to your meddling?
This could work, in theory, if the only way to access the encrypted data was through an active piece of code. In that case an attacker could, for example, run it inside a virtual machine, freeze the machine and examine its memory contents without running the code.
Comment
-
Originally posted by Wildfire View PostThis could work, in theory, if the only way to access the encrypted data was through an active piece of code. In that case an attacker could, for example, run it inside a virtual machine, freeze the machine and examine its memory contents without running the code.
Basically there is one principle: if attacker could mess with your local environment in arbitrary ways, encryption does not gives you reliable protection. Attacker with enough access to local system can subvert everything, changing code attitude. There are countless ways to fool even heavily secured code & hardware, and attacker always gets chances to alter code execution in undesired ways, wihch leads to SOMETHING. It getting impossible to evaluate how code would behave and as the result, nobody can foretold how code would perform. Hence no guarantees of its attitude. If attacker got local access, and you have live algo running with keys, attacker wins.
Some schemes like Perfect Forward Secrecy can minimize damage in similar cases, since taking over long-term key does not leads to ability to decrypt previous messages, where temporary keys were used to exchange data, and then temporary keys were irreversibly discarded by both parties. So there is no way to decrypt old stream of data. Not even for sender and receiver.
Comment
-
Originally posted by SystemCrasher View PostSome schemes like Perfect Forward Secrecy can minimize damage in similar cases, since taking over long-term key does not leads to ability to decrypt previous messages, where temporary keys were used to exchange data, and then temporary keys were irreversibly discarded by both parties. So there is no way to decrypt old stream of data. Not even for sender and receiver.
just thinking about it I think the programme might be so short that it could be recreated every time, I mean what is it basically add the elements of two arrays (or some other simple formula) and then delete the n bytes of the encryption file. If you set up your system correctly even if your laptop is snatched and the memory frozen they wouldn't be able to work out what you had been doing. Obviously if your machine or the other end gets compromised then you're broken but otherwise its full proof. I don't see why any pair of people who need encryption, Islamic State militants, politicians who want have private conversations, drug dealers, people up to illegal business practices etc don't use something like this. It could always be combined with regular encryption. If you wanted to get really paranoid you could decrypt the messages on a seperate machine that was never connected to the internet.
Comment
-
Originally posted by Rich Oliver View PostIts funny I was thinking about encryption, its not something I've studied. Encrypting messages to people you've never met is a hard problem. but encrypting messages to some one that you meet is surly incredibly easy. You've just got to create two long pieces of random data. You both keep copies of both sequences. One sequence is for your messages the other his. You send a message encrypting byte for byte, send and delete the bytes, the recipient decrypts and deletes the used bytes of the key. I reckon I could write the code in an hour may be less.
A big primer for everybody is to find on youtube or try to be at a course of Jon Callas: "Everything you need to know about crypto in <N> minutes". N can be 50, or it can be 2 hours. This is basically for anybody that has never looked into crypto. It's very accessible, and it gives you basic knowledge about encryption.
Comment
-
Originally posted by profoundWHALE View Post
AFAIK, it was cracked quickly by a very slow machine because it only had to crack repeated words that it knew would be there, and then they would get the correct sequence to decode the messages. But, what if while trying to crack it, the message changes due to your meddling?
But either way, people really shouldn't drag peoples names (or their ideas) through the mud just because they make bold claims they made because they got overly excited in the heat of the moment when their code finally bloody worked. The best of us can make that mistake, rather than mocking people for making such claims, challenge these claims instead, for example by asking them to provide some hard proof.
On one hand though, his encryption algorithm, as good as he thinks it is or not, could be pretty unbreakable by using security through obscurity; if only he and a select few use the algorithm and only he knows how it works, and it's operating differently from traditional encryption algorithms... Good luck to anyone who would try to crack it without any access to using the encryption algorithm himself.
Comment
-
Originally posted by rabcor View PostOn one hand though, his encryption algorithm, as good as he thinks it is or not, could be pretty unbreakable by using security through obscurity; if only he and a select few use the algorithm and only he knows how it works, and it's operating differently from traditional encryption algorithms... Good luck to anyone who would try to crack it without any access to using the encryption algorithm himself.
This also applies to those idiots in law enforcement who want backdoors in crypto. The real terrorists like Daesh will meet face to face while taking a walk, defeating all surveillance. Meanwhile their own cryptographers find the backdoors, and then the citizens of the lands they occupy and oppress get caught and tortured for trying to complain to the outside world.
Governments themselves are just as dangerous and no more trustworthy. In Egypt a few years ago there was that exploit against Grindr used by police to round up Gay men. That incident did not rely on ciphers but points out how in much of the world the governments themselves are terrorists too and routinely use electronic exploits to do their dirty work.
Comment
Comment