Jump to content

Cryptography Blogs/Documents


Recommended Posts

I wanted to share this with you all. It is was of the most educational documents I've found on cryptography/encryption.

My guess is many people are using TrueCrypt incorrectly. Even using a hidden volume doesn't establish plausible deniability as well as writing random data to a USB (for example) before encrypting. Then on top of that you would want to fragment the data on the drive after it is encrypted. There is a bit more too it, but this guy explains why and how they overcome encryption to eliminate plausible deniability as an escape route.

http://bitly.com/185k33n

Link to post
Share on other sites

good stuff... some of it, is a tad bit over my head, I haven't sunk my teeth into crypto that deep, but it brings up a question. Why is AES only 128 bits strong? We use things like GPG, which uses 1024 and 2048 bit keys and higher, so why doesn't AES work with such high keys, and why is it so strong with just 128?

Link to post
Share on other sites

good stuff... some of it, is a tad bit over my head, I haven't sunk my teeth into crypto that deep, but it brings up a question. Why is AES only 128 bits strong? We use things like GPG, which uses 1024 and 2048 bit keys and higher, so why doesn't AES work with such high keys, and why is it so strong with just 128?

AES-128 is an encryption algorithm which would take somewhere around and roughly 1 billion billion years for a 10.5 tera flop super computer to crack as there would be (3.4 X 10^38 possible combinations). Technically half of that because you can average about 50% of attempts will eventually crack the password. Still a lot of time.

The bits in which you are referring too do not use AES it is RSA which is much different. RSA is decimal digits which greatly decrease the number of possible combinations. This would still take a while perhaps too long for someone to process in the applicable short time RSA keys are actually used.

Correct me if i'm wrong someone.

Edited by Infatuas
Link to post
Share on other sites

good stuff... some of it, is a tad bit over my head, I haven't sunk my teeth into crypto that deep, but it brings up a question. Why is AES only 128 bits strong? We use things like GPG, which uses 1024 and 2048 bit keys and higher, so why doesn't AES work with such high keys, and why is it so strong with just 128?

http://forums.hak5.org/index.php?/topic/29492-how-secure-is-secure-128bit-vs-1024bit-webhosting-services/

^^ See the thread above. They talked about this topic a few months ago. the short version is that there is a difference between symmetric and asymmetric key sizes. Should help clear up why some algorithms use 128-bit or 256-bit and others use 1024 and 2048 (and higher B) ).

Edited by Drei_Drachen
Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...