From: Anonymous <nowhere@bsu-cs.bsu.edu>
To: cypherpunks@toad.com
Message Hash: b3650fe8cabb08b2057a8cb833278e9c9dd2ff04a45c331f3bc700816271b66b
Message ID: <9403140240.AA04160@bsu-cs.bsu.edu>
Reply To: N/A
UTC Datetime: 1994-03-14 02:40:10 UTC
Raw Date: Sun, 13 Mar 94 18:40:10 PST
From: Anonymous <nowhere@bsu-cs.bsu.edu>
Date: Sun, 13 Mar 94 18:40:10 PST
To: cypherpunks@toad.com
Subject: NSA and PGP rabblerousing
Message-ID: <9403140240.AA04160@bsu-cs.bsu.edu>
MIME-Version: 1.0
Content-Type: text/plain
From: jtaylo3@umbc.edu (Randy Taylor)
Newsgroups: alt.security,talk.politics.crypto
Subject: Re: What codes can NSA crack/not crack?
Followup-To: alt.security,talk.politics.crypto
Date: 13 Mar 1994 16:57:19 GMT
Organization: University of Maryland, Baltimore County
Lines: 54
Message-ID: <2lvglf$i43@news.umbc.edu>
References: <2hhe0i$e15@hp-col.col.hp.com> <CJuK4o.4DBJ@hawnews.watson.ibm.com> <WCS.94Mar9001430@anchor.ATT.COM>
NNTP-Posting-Host: f-umbc9.umbc.edu
X-Newsreader: TIN [version 1.2 PL2]
Just my $0.02...
I recently took a course here at UMBC called Computer Systems Security
taught by a guy who works for NCSC/NSA. A brief topic of discussion
was PGP. The guy was really biased against PGP, calling it "illegal",
but he also hinted that it had been broken. The hint was wrapped within
a "non-denial denial" (for fans of "All The President's Men") and there
was no *concrete* information given to support it.
One conclusion I drew was that:
1) NSA doesn't like PGP *at all*
2) If NSA hasn't broken PGP, they're working hard on breaking it.
One last bit - the guy did admit that PGP would be unbreakable for the
forseeable future if the the key length were increased from a max of 1,024
bits to a max of 2,048 bits. Doubling key length doesn't double search
time, it's an exponential thing.
Oh yeah, this is really the last bit... living in the same area as NSA, one
hears all kinds of rumors - but one that I've heard numerous times (and
that I give some credence to) is that the NSA measures it's floorspace
dedicated to Crays and other supercomputers in *acres*. Kind of frightening,
isn't it ?
:-)
--RT
Bill Stewart +1-510-484-6204 (wcs@anchor.ho.att.com) wrote:
: In article <JY1J-VU.keithdufour@delphi.com> keithdufour <keithdufour@delphi.com> writes:
: Nsa can crack anything you got, big boys. You think they play cards
: all day?
: When you've got mathematically-based crypto systems, you can analyze
: how much work it takes to crack them. They're harder to use than
: wimpy cryptosystems, but personal computers take care of that problem.
: That's why the NSA's trying so hard to push things like Clipper on us,
: that work around their weaknesses; otherwise they're out of luck.
: Of course, it's still easy to invent cyphers they *can* break,
: and the large number of amateur cryptographers does give them some
: ongoing business :-)
: We all must take this game more serious than trying to beat the Dallas
: Cowboys with your high school team!!
: My high school chess team could have easily beaten the Dallas Cowboys,
: unless you're talking about football or something......
: (My high school soccer team could probably have also beaten them at chess...)
: --
: # Bill Stewart AT&T Global Information Solutions (new name for NCR!)
: # 6870 Koll Center Pkwy, Pleasanton CA 94566 1-510-484-6204 fax-6399
: # Email: bill.stewart@pleasantonca.ncr.com billstewart@attmail.com
: # ViaCrypt PGP Key IDs 384/C2AFCD 1024/9D6465
Return to March 1994
Return to “Panzer Boy <panzer@dhp.com>”