DES and a question of security
Originally Posted by joebenz
very cool. i think i could really enjoy a class like that....eventho it would probably be tough....i'ved always liked a good challenge tho
I don't buy it. Are u saying that the p2p programs are using our resources to help decrypt the code or what? I think I would notice if my computer would be idling at 100% cpu usage. I think its crap but if u can please enlighten me some more.
Originally Posted by polakatl
I don't buy it. Are u saying that the p2p programs are using our resources to help decrypt the code or what? I think I would notice if my computer would be idling at 100% cpu usage. I think its crap but if u can please enlighten me some more.
since DES is an open standard, everyone in the world can have access to how DES messages are encrpyted. however it is so complicated, that decrypting it by hand is pretty much impossible. designing a machine to decrypt it has been done, but even with computing power today would take several days at the least to decipher the key used for encryption. so while technically possible to break DES encryption, several days is more than enough time for organizations to switch keys around and render the stolen key useless.
so even tho DES is an open standard and there are better schemes available, it is still widely used and considered the standard encryption scheme.
kazaa does it. regular kazaa, not kazaa lite/k++.. it's widely known that the original kazaa installs spyware on your machine that runs in the background generally without the user's knowledge. where have you been?
also, because of the endless amounts of security holes in internet explorer, windows and outlook, there are a lot of worms and spyware that can get into your system without you knowing it (use opera!). running spyware removal software regularly is a must
so even tho DES is an open standard and there are better schemes available, it is still widely used and considered the standard encryption scheme.
Originally Posted by polakatl
I don't buy it. Are u saying that the p2p programs are using our resources to help decrypt the code or what? I think I would notice if my computer would be idling at 100% cpu usage. I think its crap but if u can please enlighten me some more.
also, because of the endless amounts of security holes in internet explorer, windows and outlook, there are a lot of worms and spyware that can get into your system without you knowing it (use opera!). running spyware removal software regularly is a must
Originally Posted by mayonaise
since DES is an open standard, everyone in the world can have access to how DES messages are encrpyted. however it is so complicated, that decrypting it by hand is pretty much impossible. designing a machine to decrypt it has been done, but even with computing power today would take several days at the least to decipher the key used for encryption. so while technically possible to break DES encryption, several days is more than enough time for organizations to switch keys around and render the stolen key useless.
so even tho DES is an open standard and there are better schemes available, it is still widely used and considered the standard encryption scheme.
kazaa does it. regular kazaa, not kazaa lite/k++.. it's widely known that the original kazaa installs spyware on your machine that runs in the background generally without the user's knowledge. where have you been?
also, because of the endless amounts of security holes in internet explorer, windows and outlook, there are a lot of worms and spyware that can get into your system without you knowing it (use opera!). running spyware removal software regularly is a must
so even tho DES is an open standard and there are better schemes available, it is still widely used and considered the standard encryption scheme.
kazaa does it. regular kazaa, not kazaa lite/k++.. it's widely known that the original kazaa installs spyware on your machine that runs in the background generally without the user's knowledge. where have you been?
also, because of the endless amounts of security holes in internet explorer, windows and outlook, there are a lot of worms and spyware that can get into your system without you knowing it (use opera!). running spyware removal software regularly is a must
The key may be changeable, but with around 1 million + users in P2P programs thats a lot more resources. If in 1999 it took 22 hrs on 100,000 pcs it'll probably take 2 hrs with the pcs of today. My message is to be careful, remember there ain't no such thing as a free lunch. A lot of you may think you know it all about computers and security, but you really know maybe 0.01%.
Originally Posted by mayonaise
since DES is an open standard, everyone in the world can have access to how DES messages are encrpyted. however it is so complicated, that decrypting it by hand is pretty much impossible. designing a machine to decrypt it has been done, but even with computing power today would take several days at the least to decipher the key used for encryption. so while technically possible to break DES encryption, several days is more than enough time for organizations to switch keys around and render the stolen key useless.
Originally Posted by axemansean
The key may be changeable, but with around 1 million + users in P2P programs thats a lot more resources. If in 1999 it took 22 hrs on 100,000 pcs it'll probably take 2 hrs with the pcs of today. My message is to be careful, remember there ain't no such thing as a free lunch. A lot of you may think you know it all about computers and security, but you really know maybe 0.01%.
Originally Posted by qtiger
Useless except on every since message the cracker has waiting to be decrypted. Sure, it's easy to change things around afterwards but for sensitive information it's a horrible idea.
changing an encryption key on a regular basis is not a horrible idea for sensitive information. in fact it's one of the best ideas, no matter what kind of key-based encryption scheme(s) you're using. i don't know where you're getting that idea from.
:screwy:
Originally Posted by mayonaise
i don't understand a word that post :thinking:
changing an encryption key on a regular basis is not a horrible idea for sensitive information. in fact it's one of the best ideas, no matter what kind of key-based encryption scheme(s) you're using. i don't know where you're getting that idea from.
:screwy:
changing an encryption key on a regular basis is not a horrible idea for sensitive information. in fact it's one of the best ideas, no matter what kind of key-based encryption scheme(s) you're using. i don't know where you're getting that idea from.
:screwy:
DES is the bad idea I was speaking of.
Originally Posted by qtiger
All the messages the hacker has stored use the old key. So it doesn't matter if you change your keys daily, all the hacker has to do it store your encrypted data on his hard drive until he breaks the keys.
DES is the bad idea I was speaking of.
DES is the bad idea I was speaking of.
DES by itself may not be the best idea, but 3DES is still pretty secure. breaking an encryption key is incredible difficult given almost all modern encryption schemes still in use today (including DES). that's why in the vast majority of cases, hackers attempting to gain access to encrypted information would probably unanimously prefer to just steal a key or a password, NOT break the encryption.


