Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:And the NSA? (Score 1) 183 183

Probably none at all. If you want to break today's encryption/hashing algorithms you would probably be using ASICs if not those then FPGAs with GPU compute being your last choice.

ASICs, FPGAs and GPUs are all utterly, utterly inadequate to attack today's encryption and hashing algorithms. Unless you have not only tens of billions of dollars but also don't mind waiting millions of years. http://tech.slashdot.org/comme....

Comment Re:And the NSA? (Score 1) 183 183

For that, you would be using custom ASIC hardware, and lots of it.

No, for that you just laugh at the guy asking you to do it, and look for ways to steal the key, rather than brute forcing it. Even if an ASIC solution gets to way beyond exascale, say to yottascale (10^6 times faster than exascale), you're still looking at on the order of a million years to recover a single 128-bit AES key, on average.

Brute force is not how you attack modern cryptosystems. More detail: http://tech.slashdot.org/comme...

Comment Re:And the NSA? (Score 1) 183 183

What would the existence of an exascale supercomputer mean for today's popular encryption/hashing algorithms?

Nothing, nothing at all.

Suppose, for example that your exascale computer could do exa-AES-ops... 10^18 AES encryptions per second. It would take that computer 1.7E20 seconds to brute force half of the AES-128 key space. That's 5.4E12 years, to achieve a 50% chance of recovering a single key.

And if that weren't the case, you could always step up to 192 or 256-bit keys. In "Applied Cryptography", in the chapter on key length, Bruce Schneier analyzed thermodynamic limitations on brute force key search. He calculated the amount of energy required for a perfectly efficient computer to merely increment a counter through all of its values. That's not to actually do anything useful like perform an AES operation and a comparison to test a particular key, but merely to count through all possible keys. Such a computer, running at the ambient temperature of the universe, would consume 4.4E-6 ergs to set or clear a single bit. Consuming the entire output of our star for a year, and cycling through the states in an order chosen to minimize bit flips rather than just counting sequentially, would provide enough energy for this computer to count through 2^187. The entire output of the sun for 32 years gets us up to 2^192. To run a perfectly-efficient computer through 2^256 states, you'd need to capture all of the energy from approximately 137 billion supernovae[*]. To brute force a 256-bit key you'd need to not only change your counter to each value, you'd then need to perform an AES operation.

Raw computing power is not and never will be the way to break modern crypto systems[**]. To break them you need to either exploit unknown weaknesses in the algorithms (which means you have to be smarter than the world's academic cryptographers), or exploit defects in the implementation (e.g. side channel attacks) or find other ways to get the keys -- attack the key management. The last option is always the best, though implementation defects are also quite productive. Neither of them benefit significantly from having massive computational resources available.

[*] Schneier didn't take into account reversible computing in his calculation. A cleverly-constructed perfectly-efficient computer could make use of reversible circuits everywhere they can work, and a carefully-constructed algorithm could make use of as much reversibility as possible. With that, it might be feasible to lower the energy requirements significantly, maybe even several orders of magnitude (though that would be tough). We're still talking energy requirements involving the total energy output of many supernovae.

[**] Another possibility is to change the question entirely by creating computers that don't operate sequentially, but instead test all possible answers at once. Quantum computers. Their practical application to the complex messiness of block ciphers is questionable, though the mathematical simplicity of public key encryption is easy to implement on QCs. Assuming we ever manage to build them on the necessary scale. If we do, we can expect an intense new focus on protocols built around symmetric cryptography, I expect.

Comment Re:"...the same as trespassing." (Score 1) 1054 1054

Not true, Indiana allows deadly force in defense of property, and there is no duty to retreat. And it includes your vehicle when away from home.

Cite?

I think you're talking about Indiana's Castle Doctrine law, which gives you the right to assume that you're threatened with death if someone breaks into your house or car (some states also include place of business). But the authorization is for self-defense, not defense of property. The Castle Doctrine just means that the law automatically assumes that you were at risk of death or serious injury in those locations, and you don't have to justify it.

Comment Re:"...the same as trespassing." (Score 1) 1054 1054

If a guy is stealing your car, would you just watch him and let him do it? Or, you could threaten him with the gun, but both you and him know that you can't legally pull the trigger? So he continues to steal your car, and you can't do anything at all to defend your property??

I can use non-lethal force. There are lots of options available.

But, no, I will not kill a man to stop him from taking my stuff. I have insurance. The situation changes dramatically if my kid is in the back seat, of course.

Comment Re:"...the same as trespassing." (Score 1) 1054 1054

Most states allow deadly force for forcible felonies, and include burglary. The rationale there is that the house may not be empty, and so there may be human lives at risk. It's a reasonable choice.

So, in Missouri, not only can you shoot someone for simply breaking into your house while you're home, after January 1, 2017, you can also shoot them in the back as they run away.

This is even more wrong.

Comment Re:Ha ha ha ha..... (Score 1) 81 81

Rate me -1 troll, but I think it's hilarious that "the science fiction future" for which everyone is optimistically hoping is being brought to us by something so prosaic and "dirty" and anti-utopian as murdering people.

Clearly, we need a major war which absolutely requires that every soldier be equipped with a personal jetpack.

Comment Re:Shooting Guns into the Air in a Populated Area (Score 1) 1054 1054

Discharging any weapon in a populated area except at a proper range or in defense of your life is generally illegal and a very bad idea.

Often illegal, yes. Firing birdshot into the air is not dangerous. That's why we use shotguns and birdshot to shoot birds. From the air. Birdshot's terminal velocity is low enough that by the time the shot falls to the ground it's not dangerous.

Comment Re:"...the same as trespassing." (Score 4, Insightful) 1054 1054

I dont know about Kentucky, however in Texas you can shoot people for Criminal Trespass. You can use deadly force to protect your self and your property.

Texas is the only state that allows deadly force to be used in defense of property. This is a case where Texas is wrong and the rest of the country is right. I'm all for the right to keep and bear arms, I carry daily and am a certified concealed weapons instructor. But deadly force should only be used to defend people, not stuff.

Like punning, programming is a play on words.

Working...