But it's not just about cracking the encryption by brute force you see. To use any encryption method you have to generate a key that can be used to decrypt the message at the other end and then you have to supply the recipient with that key somehow. If I detect that you are sending encrypted messages to someone else on a regular basis and I have access to the backbone network sooner or later I'm going to intercept a key exchange simply by storing all the data packets from you to anyone else and analyzing them to look for a key exchange.rEvolutionist wrote:You don't need US encryption to have an unbeatable encryption system. Most of these systems are studied in universities around the world. For example we studied RSA, and I could implement a weak (i.e. small key) version of it with my home PC. Unfortunately, I've forgotten most of the details of asymmetrical encryption, but it's not anywhere near as straight forwards as you would think it is. It's not a matter of picking a password or a simple key. They are 128+ bit keys which are based around a presently unsolvable algorithm for factoring prime numbers. That algorithm will be solvable with quantum computing. But with present computer architectures, it's simply never going to be solvable within useful time frames (i.e. less than a couple of decades). Tor and other top shelf encryption systems use that sort of encryption. Some may use shorter keys that can be solved by a super computer in usable timeframes. It's really a matter of how secret you want to keep something. Unless there's been some crazy advance in mathematics in the last 10 years that I'm not aware about, then high bit asymmetrical key encryption is still going to be safe. The protocol itself will be safe, but there could be other weak points in the system (like key generation and storage), and perhaps that's where they break into these things.Seth wrote:That's what everybody thought, but they were wrong. Most of the vulnerability has to do with human behavior and the fact that only the most careful of spies actually uses a secure password/encryption key. This creates a very limited universe of probable combinations that supercomputers can process in a reasonable amount of time.rEvolutionist wrote:I'm not sure that's true. I studied cryptography at uni, and at the time the best encryption would have taken in the range of tens of thousand of years to break with a supercomputer. The real game changer will be (if and) when quantum computers become a reality. They'll be able to break all encryption in hours/days.
Besides, any commercial encryption system for sale in the US MUST be crackable by the NSA by law. If it can't be, the government will prohibit distribution of the software. Encryption technology is classified as a "munition" and there are very strict laws about exporting munitions pretty much everywhere.
This can be defeated by using a different transmission media to exchange keys of course, but as I said, merely sending encrypted messages that NSA can't read makes you a target for greater scrutiny, and if the humint element decides that you might be a threat, then the methods of intercepting the key exchange, or the unencrypted message itself as it's created come into play. Defeating potential TEMPEST attacks costs the CIA billions of dollars, and then there's keylogger software....
This is why the one-time pad works, so long as the duplicate pad is securely transferred to the recipient. Using innocuous phrases to encode messages is obfuscatory in that the watcher hopefully won't take note of the message, but even if they do intercept it unless they get access to the pad there is no way to decode the message...if the one-time pad is done properly.