• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Any encryption in the Bin Laden intel that NSA can not break

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.
NSA has backdoor access to every password protection mechanism. No brute force needed.

That'd be bad security practice, on account that someone else could find the backdoor. Traditionally, the US gov just kept exported crypto down to something that was easily crackable, but I think that restrictions been lifted with the advent of public key cryptography.

I think people are right, AES-256 will never be cracked by any amount of computing power we as a society will produce for the near future. That said, the amount of password guesses needed to just log into his computer is probably far less than the amount of key guesses needed to break the crypto.
 
A security expert on Radio-Canada just said that most of the encryption codes used by terrorists are very simple. These folks simply don't expect to get caught.
 
If they repeat a section of the one time pad, then you can break it (for the overlapped portions)

It will give you a clue, but the messages on them are usually short, and "one time" so it might take several using the same pad with several different overlaps to really crack one.

A big part of cracking Enigma in WWII was because of overlaps (known repeated messages with the same code group), but that was far from the absolute encryption of a one time pad, and it took many repats for us to start understanding it, and the grunt work was done by the firt computers (reels).
 
Last edited:
Back
Top