IBM using Napoleon Dynamite Quote to Encrypt Data 170
schmack writes "A developer discovers a quote from the movie Napoleon Dynamite is being used as the cipher key by IBM to publish encrypted XML at this year's Wimbledon grand slam. But is this a rather glaring lapse in security or an easter egg for curious hackers, many of whom would surely be fans of the quirky movie?"
What is with that movie? (Score:1, Flamebait)
As to being a security issue, unless someone compiles all quotes from all movies into a text file, it is not.
Preemptive Questioning Your Own Answers (Score:5, Insightful)
Look, it's all right there:
Q. Why do people like it?
A. It was totally retarded.
You're, uh, one step away from Yoda-speak.
Re:Preemptive Questioning Your Own Answers (Score:2, Funny)
Re:Preemptive Questioning Your Own Answers (Score:3, Funny)
Re:What is with that movie? (Score:5, Funny)
roman_mir, don't be jealous that I've been chatting online with babes, all day. Besides, we both know I'm training to become a cage fighter.
Re:What is with that movie? (Score:2)
Re:What is with that movie? (Score:5, Funny)
Re:What is with that movie? (Score:2)
The fact that you didn't recognize one of the most often-used quotes of the movie means that you probably didn't watch it. Since you didn't watch it, how do you know that "it was totally retarded"? Did you read that somewhere and decide that it sounded cool and anti-trendy to hate the movie?
Re:What is with that movie? (Score:1)
Re:What is with that movie? (Score:2)
Re:What is with that movie? (Score:2)
Thanks for fixing my (and others) opinions!
Re:What is with that movie? (Score:2)
Re:What is with that movie? (Score:2)
Moron.
(by the way, isn't it nice how the very first post in this thread is moded as a Flamebait, while it is actually just an opinion. You don't like opinions, do you, mods?
Re:What is with that movie? (Score:2)
Re:What is with that movie? (Score:2)
This is all a matter of perception. I see an opinion, someone else sees a flamebait because it contradicts his/her opinion.
Re:What is with that movie? (Score:2)
Re:What is with that movie? (Score:1, Interesting)
There is a disturbing trend in film today that automatically bills any film that is both watchable and different as a "cult classic" or a "hidden gem". I find it personally disturbing that people seem to be losing their ability to a) seperate humor from simple sarcasm or irony, and b) discern aesthetic merit -- not absolutely but just generally -- and seperate pure schlock from geuine plot-driven, substantive films.
Re:What is with that movie? (Score:4, Insightful)
I really like the movie, granted it was annoying at times the first run through.
I imagine one of the reasons it's popular because it's a movie about "losers", you don't really see that too often. Even when you do, they characters aren't really losers, just perceived that way (and usually not perceived that way by the final reel).
Re:What is with that movie? (Score:3, Insightful)
There's plenty of people who don't like, or haven't seen, Napoleon Dynamite, but there are others who think it's one of the funniest mo
Re:What is with that movie? (Score:2)
Re:What is with that movie? (Score:2)
As TFA says, the line was in clear text elsewhere in the file. So it was like hiding the front door key under the doormat. Maybe its real purpose is to give legal weight to a claim that it wasn't published freely, in case they want to shut down anyone leeching it commercially. Probably it's a DMCA violation to crack the encryption.
And I think you'll find that movie quotes ARE compiled into text fi
It's satire (Score:3, Informative)
Re:It's satire (Score:2)
Re:What is with that movie? (Score:2)
Re:What is with that movie? (Score:2)
I'm too lazy at the moment, but if you calculated the number of substring with say, 1-10 words, I think you'd find that the key space is more than large enough.
Script substrings (Score:2)
Let N be the number of words in a script.
Number of 1-word substrings: N
Number of 2-word substrings: N - 1 (because the last word can't begin a 2-word substring)
subtotal: 2N - 1
Number of 3-word substrings: N - 2
subtotal: 3N - 3
Number of 4-word substrings: N - 3
subtotal: 4N - 6
10N - 45 is a miserable excuse for a keyspace.
Scripts of popular movies such as
Re:Script substrings (Score:5, Funny)
We apologize for the inconvenience.
A m00se once bit my sister...
Re:Script substrings (Score:5, Interesting)
Amen!
I've seen this on some of my external servers - long lists of dictionary attacks. For a while someone was trying to log into executioner. Before an IP filter was added, we would get tons of login attempts in the logs. Quotes were always in there, including things like Darth quotes (Ifylofd, Tfiswto, Issapinfs, Ysnhcb, and the l33t spelling variants of words and phrases). It became a bit of a game to figure out who could guess the quote based on the attempted password. If you think the first letters of a quote are protection, you are in for a rude awakening when you get back into the office next week. (Happy 4th of July to those in the States)
Re:Script substrings (Score:2, Informative)
Re:Script substrings (Score:2, Funny)
Re:Script substrings (Score:2)
The answer (Score:2)
The number of different quotes in the movie that could be used: Like a finity.
Re:What is with that movie? (Score:2)
Re:What is with that movie? (Score:2)
depends (Score:4, Interesting)
Re:depends (Score:2)
Re:depends (Score:5, Funny)
Once the terrorists gain access to the scores from Wimbledon then it's all over for the free world. They could use our own tennis scores against us.
They had better be using the strongest encryption available for this kind of thing.
Re:depends (Score:2)
Once the terrorists gain access to the scores from Wimbledon then it's all over for the free world. They could use our own tennis scores against us.
Be on the lookout for blacmanges with AK-47s.
Re:depends (Score:2)
That, and my pet liger.
Re:depends (Score:2)
Huh? (Score:5, Insightful)
Re:Huh? (Score:5, Insightful)
If a project doesn't require strong encryption, does it require encryption at all?
Re:Huh? (Score:2)
If you don't want normal people to access the project, a standard encryption like 128bit AES is enough to feel safe.
By normal people I mean bored people with only little computing power.
But if you for some reason want to pass around data about your nuclear projects or such, you'd take many more precautions and use multiple and stronger encryption schemes, to be on the safer side of safe.
These projects are in the interest of strong governments who have we don't know how much computing power and intention
Re:Huh? (Score:5, Informative)
There are a few things I wish to clarify about your post
First off, right now 128 bit AES is virtually unbreakable. I mean, the US government has approved 128 bit AES for use in encrypting classifed documents. That should tell you alot. It's true, maybe in 10 years or so, one might be able to crack 128 bit AES in a few weeks or so, which is kinda bad for a modern cipher. But you can rest assured, if you use 128 bit AES (correctly implemented, and with a good password), there isn't a force on earth that could crack it (right now, that is).
This statement makes no sense at all. Do you have any idea how fast AES is? On my puny, 2 year old, cheap crap Dell computer, I just benchmarked 256 bit AES, it can encrypt 55.3 MB/s. Fifty-five megabytes per second! That's fast as hell! By little computing power, are you reffering to ENIAC? 'Cause I bet even that transistor-less monster can crank out a few kbs per seconds, AES is that fast. I routinely watch Hi-Def movies on a drive encrypted by TrueCrypt. That means that the movie is decrypted on the fly, while I'm watching it!
I HATE IT when people say "Well, I'm sure that NSA could crack any cipher, their so secrative and so cool!" NO THEY COULDN'T. No one can crack a 256 bit AES with a correct implementation (and a good key). It's just not doable. I refer you to an earlier post of mine, [slashdot.org] where I got really pissed and did a few calculations. You cannot crack 256 bit AES. It's. Not. Possible.
The mistake you seem to be making in your post is that you assume that most encrypted material get cracked because they used a weak cipher. That is not true. 99.9999% of all modern codes that are cracked are cracked because of a poor implementation. Some-one selects a bad password, maybe someone gets your PGP key from your computer, maybe a secret agent beat the crap out the poor IT guy and got in. Whatever. It's simply not feasable to crack modern ciphers by cryptanalysis. It's virtually impossible, and there are so many easier ways to do it.
In conclusion: If you want your material safe, it's fine to use 128 bit AES, but there's no reason not to use 256 bit, so you could just as well use that. Just make damn sure that you use a good password and keep it safe. And no, a quote from Napoleon Dynamite is NOT a good password.
Re:Huh? (Score:2)
Well, no they couldn't for brute force attacks on the key.
But that's not the only attack vector out there for AES (or other block cipher
Re:Huh? (Score:4, Interesting)
This is exactly my point (maybe I wasn't very clear ;). If you want to break the encryptions, you don't do it using cryptanalysis. The only way is exploiting the human factors. The ciphers themselves are solid. That's why I said "using the correct implementation and a good key" all the time. If you encrypt something with a tool like TrueCrypt [truecrypt.org] which uses a rock solid, completly bulletproof implementation with a good password (and, ofcourse, assuming that no one has hacked your system) you will be completly safe from any potential snoopers.
I really can't say enough good things about TrueCrypt. Every step of the process is done 100% right. What it does is that it it mounts a virtual drive on your system that is encrypted to a file on your harddrive. There is no trace in the files themselves that they are encrypted, they are completly idestinguisable to random noise. You can even hide a hidden drive inside a volume (so if someone forces you to reveal your password, you can still hide a bunch of files inside a volume). It is completly impossible to know whether a hidden drive even exists within a virtual drive if you don't have the password (for the hidden drive that is, which should be different from your standard drive password). It also includes tons of other features, you can choose any cipher you like, from Blowfish to 3-DES (although I have no idea why you wouldn't just go with 256 bit AES), you can backup the fileheaders if someone loses their password, you can use keyfiles in addition to your passwords, you can create "travel disks" so you can take your encrypted stuff on the road an not have to install TrueCrypt on every computer you wish to use, and any other feature you could possibly want if you want to encrypt data. If you don't want to bother with PGP, you could even make a tiny drive, add your files to it, and email it to someone! It's also fast as hell, as I said, you could watch Hi-Def movies from an encrypted drive and it will decrypt it on the fly and you wont notice a thing. All that, and it's open source! I really encourage anyone to use it that has a need to encrypt data.
Re:Huh? (Score:2)
Re:Huh? (Score:2, Informative)
Re:Huh? (Score:5, Insightful)
Of course it does. The lock to your house is most certainly breakable. Does that mean you should throw away the door?
Weak'ish encryption protects you against untargetted attacks, such as network-snooping. Anybody doing untargetted attacks are probably going to have massive amount of data to search through. Even the most simplistic encryption algorithm involving keys is going to force the attacker to include state-information in his application.. which as we all is just plain painfull on high-traffic networks.
Re:Huh? (Score:3, Funny)
If you're going camping you don't necessarily need to lock your tent door up, because it's such a trivial thing to do
Re:Huh? (Score:2)
With the tent door closed, they have to chance somebody lieing inside taking a nap
Good choice of analogy.
Re:Huh? (Score:1)
Re:Huh? (Score:2)
Re:Huh? (Score:5, Insightful)
Yes.
It's a common misconception that encryption is supposed to be 'unbreakable' (for some large value of 'unbreakable'), in all instances. In the real world of security (I.E. DoD etc...) it's quite common to have the complexity and difficulty of the cipher or code to match the 'speed value' (to coin a term) of the information. For example, diplomatic messages need to be kept hidden essentially forever - thus strong encryption. Tactical communications between Army formations or Navy ships can have a much lesser grade of encryption applied because their value is almost always rendered moot before they can be broken.
The 'need' for ultra-strong, resist-attack forever grade encryption for personal use is an artifact of the (not uncommon) geek need to be [bigger|faster|stronger] than anyone else when it comes to computer stuff.
It's not just a pissing contest (Score:3, Informative)
Re:It's not just a pissing contest (Score:2)
Re:Huh? (Score:2)
That's not the case, infact the oposite is likely to be the case as aes(message,key) is likely to be well-tested, well-documented code you can simply use whereas xor_with_sillystring(message) is likely to first need being written
Is there any point to weak encryption? (Score:3, Informative)
That is an insightful question.
Historically, weak encryption had a niche for information whose value dropped sharply over time. If you have a lame algorithm that a cluster of supercomputers can crack in a week, you can still safely use it for messages like "unit 3, fall back to hill 41, await instructions".
Sports scores might fall into that category, though the problem in this particular case was not weak encryption, it wa
Re:Is there any point to weak encryption? (Score:2)
You want the information to appear to be protected, but to leak anyway.
If you want this to ever work, you need to routinely use weak encryption on things of varying importance, so that the importance of a message is unpredictable from the contents. (Naturally you will make sure that nothing REALLY important ever gets encrypted weakly
This is the category that includes easter eggs, etc. And I suspect that the Wimble
Re:Huh? (Score:1)
Let me be the first to say... (Score:5, Funny)
Re:Let me be the first to say... (Score:2)
The client had the key anyway. (Score:5, Insightful)
If you read the article, you'll see that he found the key in the flash applet that presented the data to the website visitors. So even if they used a truly random key, it would be worth no more, since the client could just read the flash file (de-assemblers for flash is out there. Search on google.), and get the key. So really, there is no point of better encryption, because the determined people will get the key anyway.
Remember that flash runs on your computer. Thus, the encryption key has to be on your computer so the flash application can decode the XML file and show you the results. As long as Trusted Computing does not excist, there is no way to stop a determined person from getting the key. Thus, using a stronger key would not make it more difficult. It is not like the key was discovered by accident. The writer of TFA was looking for the key in the flash file...
Nothing here to see, please move along!
Exactly! (Score:5, Insightful)
Re:Exactly! (Score:5, Insightful)
To force people interested in live stats either to view their website (=ad revenue) or watch their tv broadcast (=ad revenue). 3rd party apps accessing the information means less ad revenue. Simple as that.
Re:Exactly! (Score:2)
Re:Exactly! (Score:2)
Re:The client had the key anyway. (Score:4, Informative)
DMCA? (Score:2)
Re:DMCA? (Score:1)
Wimbledon = England.
Flash player 8 (Score:3, Interesting)
Re:Flash player 8 (Score:1)
Yes, Flash Player 8 is standard. The public beta of Flash Player 9 http://www.adobe.com/products/flashplayer/public_b eta/ [adobe.com] is also available (at least for Mac Intel).
Re:Flash player 8 (Score:1)
Re:Flash player 8 (Score:2)
Re:you can (Score:3, Insightful)
Microsoft uses "Wildebeest!!" as a password (Score:1, Interesting)
Gosh! (Score:4, Funny)
sweet tags, napoleon (Score:1)
TAGS: wimbledon | ibm | napoleon | dynamite | encryption | liger |
This is pretty much.... (Score:3, Funny)
Please, ITninja, like anyone could even know that.
Spending too much time on Onion (Score:1)
eets a slayjhammer (Score:3, Funny)
How do you keep a bunch of computer nerd hackers in suspense?...
What's the big deal...? (Score:2)
Re:What's the big deal...? (Score:1)
Huh? (Score:1, Insightful)
??
Somehow, I'm missing something about how obvious this "quote" is supposed to be.
Star Wars + Napolean Dynamite (Score:2, Funny)
Is there an IANAL in the house? (Score:2)
It's not clear that the "work" is or isn't protectable (shouldn't be, but I remember a lot of fuss about similar sports related content from some other site). Or is it now enough to have token encryption like this to make it illegal to "circumvent" it?
Re:Is there an IANAL in the house? (Score:2)
Re:Is there an IANAL in the house? (Score:2)
exclusive rights to them and everything else.
Re:Is there an IANAL in the house? (Score:2)
Randomly Generated? (Score:5, Funny)
Copyright Violation (Score:2)
No-one tell Darl
Me Jar Jar is safeish (Score:2, Funny)
Re:Me Jar Jar is safeish (Score:2)
Westly Crusher? Is that a mixture of The Princess Bride and ST:TNG?
Picard: "Mr. Crusher, engage."
Crusher: "As... you... wish..."
Re:well... (Score:3, Insightful)
Re:well... (Score:4, Funny)
Captain Obvious to the rescue once again!
Thank you, Captain Obvious (Score:5, Funny)
Re:well... (Score:2, Funny)
Re:I thought Napoleon Dynamite was a horrible movi (Score:4, Insightful)
Re:Well... (Score:2)
Re:Well... (Score:2)