aman Posted August 14, 2002 Posted August 14, 2002 Thanks Faf. I feel pretty secure but why would anyone want the password of harmless old me? I'm not even a pimple on Gods butt. I wouldn't mind if somebody got in and erased some of my debts. Thanks for sharing that information and the calculations present it real well. Just aman
Radical Edward Posted August 15, 2002 Posted August 15, 2002 yep. however it is just getting passwords. I still maintain that I am right, and that a random encryption key that is as big as the message is uncrackable if only used once (I neglected to say it is only used once in the original point, but I meant it by implication as it is covered by the rest of the statement anyway)
aman Posted August 15, 2002 Posted August 15, 2002 Nothing is uncrackable with the last key. First floor dungeon. Jewelry department. Leg chains, ankle chains, wrist chains, neck chains, thumb screws and nooses from the finest rope. Second floor dungeon. Furniture department. Iron lady, the rack, Guillatine, carving table, boiling oil and cages of the finest iron. Thats from the movie "10000 fingers of dr. T." I guess it will be break the man with the key. I love being a nobody. Just aman
Radical Edward Posted August 15, 2002 Posted August 15, 2002 heh .I'll assume that's a joke as I have no idea what you're on about there
aman Posted August 15, 2002 Posted August 15, 2002 I'm just saying the nasties in Gov'ts will be ruthless in getting the key if they need it or the info after it is decrypted. If they can't break the key then they'll break the men with the key. I hate that espionage crap but it is a reality. If it was a perfect world then we wouldn't need the codes and in an imperfect world people can behave scary. That's why I enjoy being a nobody who who knows nothing Just aman
Radical Edward Posted August 15, 2002 Posted August 15, 2002 you'd jsut destroy the key immediately after using it. If they got hold of the key, you would probably have the message with it, or torture the person who got the message. camp delta perhaps.
aman Posted August 15, 2002 Posted August 15, 2002 There is a drug that causes short term memory loss that they use now in heart bypass surgury so you don't remember all the tubes or ventilator right after surgery. Maybe that would work on forgetting a message. Just aman
Radical Edward Posted August 15, 2002 Posted August 15, 2002 that could well make the point of sending a message redundant though.
aman Posted August 16, 2002 Posted August 16, 2002 I think I'd want a long acting drug that not only made me forget the message but forget the torture. Just pop a quick acting capsule.
Radical Edward Posted August 17, 2002 Posted August 17, 2002 heh. anyway the emphasis is on protecting the message. It might only be a short term thing, like protecting bank details when a transaction is made, the codes to the Nuclear weapons launch (which are changed on regular intervals) or other military purposes and so on. current methods are okay, such as PPP and so on, but they are crackable - it just takes time. this method of a one time random key that is as big as the message is uncrackable.
Guest Syntax Posted October 29, 2002 Posted October 29, 2002 I dont think there are a such thing as an uncrackable algorithm, unless you create an active encryption method. Meaning, make software that the encryption algorithm shifts every day, and mixes up, due to processes, etc.. It would be almost impossible to crack.. Just like most will say, I'll stick with xor until I learn better
dudels Posted October 31, 2002 Posted October 31, 2002 Isn't there a law or something that requires you to send encrytion keys to the Government authority if requested? I may have misinterperated the article that I read about it (was a while ago so I do not have a link). Also, it was mentioned here that there is no point in having an encryption that can not be decrypted. I Disagree with this completely. A one-way encryption algorithm is most useful in the case for authentication. For example, a website can keep details of its users in database. These users will not be very happy when they learn that the databose had been compromised and all their passwords are stolen. One-way encryption has its uses here in that instead of storing the passwords in their palin-text form they can be stored in their encrypted hash. When the user logs into the site the authentication system will check the hash of the submitted password against that of the one kept in the database, if they are equal then they are allowed access. This way, if the database does get compromised then all that would be lost are a few utterly useless hash codes.
quantumpunk23 Posted March 20, 2004 Posted March 20, 2004 I have never seen such confusion over something that has been proven. The only completly secure classical encryption method is the one time pad. It has been mathematically proven and is also quite intuitive as well. As far as quantum key distribution is concerned, it is also theoretically proven to be "uncrackable." The reason for this is, if after comparing a sample of the sifted keys, Alice and Bob can then determine if their mutual (Shannon) information is higher than that of Eve's (by noting the error rate). If it is, they continue, if not, they ditch the key and start over. The simple fact that Eve introduces errors by merely examining the qubits is what makes QKD secure. Too further lower Eve's information about the key, Alice and Bob simply implement well known classical secrecy amplification algorithms. Just check out LANLs preprint server, there are tons of papers that go much more in depth into how it works. However, "photon guns" that shoot out pulses of exactly one photon are not feasable therefore Eve could use beamsplitting techniques to intercept the key, but I am not all that well versed on this method so I'll go no further. Needless to say, cryptologists are working on methods of cracking QKD, but most of these methods attack the flaws in the technology we are forced to used in implementation, not the physics of QKD itself. Also, to the guy who said anything that could be decrypted could be cracked: get real. Someone already explained it, but I'll reiterate. The one time pad makes a message secure because if one attempts to decrypt it one could come up with anything of equal length. If you think you can crack the one time pad by all means, have at it. If I were you, I would stick to things in the realm of the possible.
Rasori Posted March 21, 2004 Posted March 21, 2004 How about hiring a nobody to make a new language (characters included) and storing the decipher keys in nothing but his head. The government would look for the people who had the message or program, but the nobody wouldn't be in that group. And it's hard to find a nobody in a world with 6 Billion + nobodies. Then, of course, pay the nobody with cash (untraceable), and have him access the computer with the program/message on it through 50 different computers, starting at a different computer (public library, internet cafe, etc) each time. And by through 50 different computers, I mean to use that gotomypc thing, then access it on each computer until you finally get to the main computer itself. But, it requires a lot of money, a real important need, and a computer geek who has a REALLY good memory.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now