[Discuss] email privacy/security

Richard Pieri richard.pieri at gmail.com
Tue Aug 6 12:10:37 EDT 2013


Kent Borg wrote:
> Lessor crypto, however, might be very breakable--when they care about
> specific and limited targets--but impossible for them to handle in
> snoop-everything bulk.

I believe that this is not true. If I'm right, if the NSA has 
compromised most of the public CAs (if not all of them), then what you 
describe as impossible is only slightly more difficult for them than 
snooping on unencrypted traffic.

I believe that the NSA can break 3DES in near real time and AES in 
substantially less than polynomial time. If I'm right about this then 
the NSA has more than enough resources to devote to cracking "private" 
SSL and SSH communications that aren't exposed through public CA 
compromises.

And even if these fail through there are still the CRIME and BREACH 
attacks against SSL. These require massive quantities of known 
plain-text "phrases". The NSA probably has the largest amalgamation of 
such phrases in the world, and it has the computing capacity to exploit 
that data.

-- 
Rich P.



More information about the Discuss mailing list