[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::hackers_v1

Title:-={ H A C K E R S }=-
Notice:Write locked - see NOTED::HACKERS
Moderator:DIEHRD::MORRIS
Created:Thu Feb 20 1986
Last Modified:Mon Aug 03 1992
Last Successful Update:Fri Jun 06 1997
Number of topics:680
Total number of notes:5456

619.0. "How Secure Is Encrypt ?" by AYOV18::STRACHAN (A node is as good as a wink) Thu Dec 03 1987 09:01

    
    Is ENCRYPT secure ?
    
    Can an encrypted file be decrypted without using the key ?
    
    If so, how ?
    
                                               /Igs
T.RTitleUserPersonal
Name
DateLines
619.1TLE::BRETTThu Dec 03 1987 15:0435
    Is ENCRYPT secure ?  NO - a corollary of the answer to your next
			      question
    
    
    Can an encrypted file be decrypted without using the key ?  YES
    
    
    If so, how ?  TRY ALL POSSIBLE KEYS, USE STATISTICALLY ANALYSIS
    		  OF THE RESULTING FILES TO DECIDE WHICH WAS MOST LIKELY
    		  TO BE THE ORIGINAL...
    
                   
    
    Seriously, your questions show a basic lack of understanding of
    enciphering technology.  I believe you mean the DIGITAL supported
    ENCRYPT product?  It uses the DES - and with current technology
    I have seen estimates that it costs around $10,000 to decrypt a message
    after substantial ($xM) up-front costs in getting various bits of h/w
    built and some precomputation done.  I don't know of any companies
    that are selling a "break any DES message" service yet - but I bet
    both the US and USSR govts, and probably several of the European
    govts. are capable of it.  Some US guy who should know said he
    wouldn't bet a plugged?wooden? nickel that the Russians couldn't
    break the DES.
    
    So the answer to your question is - security is a $ estimate, not
    a straight Y or N answer.  If the cost of breaking the message is
    high enough, it becomes cheaper to bribe someone into telling you
    what the key (or message) is - or break into their system and put
    in a trojan horse that records all keys that ENCRYPT has been used
    with.
    
    How secure do you want your data to be?
    
    /Bevin        
619.264 only bit keysHERON::GUILLAUMEFri Dec 04 1987 06:497
619.3PASTIS::MONAHANI am not a free number, I am a telephone boxFri Dec 04 1987 11:2918
    	The "all possible keys" is 2^56 of them, though this can be reduced
    a little with some mathematical trickery.
    
    	I have seen estimates that a special purpose computer system could
    be built for less than $50M. that would crack most DES encrypted
    messages in less than a fortnight.
    
    	A commercial organisation would have to only decrypt messages that
    it had obtained by legal means, since with only commercial security the
    existance of such an installation could not be kept concealed
    indefinitely. Also it would expect to show a reasonable return on the
    investment. A criminal organisation might be less worried where it got
    the messages, but would require a higher return on investment.
    
    	Cracking DES is no doubt feasible and practical for the NSA, KGB,
    MI5 etc., but I would expect that between commercial organisations
    there will be cheaper alternatives for a long time to come. Do you do
    positive vetting on *everyone* who has access to your computer room?
619.4Re: .2 - YESTOOK::MICHAUDJeff MichaudFri Dec 04 1987 21:360
619.5Encrypted Key In Process TableBLITZN::ROBERTSPeace .XOR. Freedom ?Mon Dec 07 1987 18:4411
    I suspect that another failure of VMS ENCRYPT is that it places the
    encrypted key into the process logical table.  If you have the
    privilege to read someone else's process table, you might be able to
    create an identical encrypted key for yourself - thus you could decrypt
    an encrypted file without knowing the decrypted key. 
    
    I haven't tried this, but it seems feasible.  Anyone done it?
    
    						/Dwayne
    
    
619.6PASTIS::MONAHANI am not a free number, I am a telephone boxTue Dec 08 1987 09:025
    	If you have sufficient privilege to get at the logical name table
    of another process (CMKRNL) then you can also get at the data before it
    is encrypted or after it is decrypted.
    
    	There is no security against a privileged user on your system.