0 Members and 1 Guest are viewing this topic.

... When you realise how futile it is to try to communicate privately, the only sensible thing for any terrorist or criminal to do is give up and go and live a normal life instead.

Part 3 of the Regulation of Investigatory Powers Act 2000 gives the police powers to order the disclosure of encryption keys, or force suspects to decrypt encrypted data. Anyone who refuses to hand over a key to the police would face up to two years' imprisonment. Under current anti-terrorism legislation, terrorist suspects now face up to five years for withholding keys.

The terms of the RIPA , (Regulation of Investigatory Powers Act), suggest that UK government cannot crack all encryption ... Quote from: openrightsgroup.orgPart 3 of the Regulation of Investigatory Powers Act 2000 gives the police powers to order the disclosure of encryption keys, or force suspects to decrypt encrypted data. Anyone who refuses to hand over a key to the police would face up to two years' imprisonment. Under current anti-terrorism legislation, terrorist suspects now face up to five years for withholding keys. ...sorry, you cannot view external links. To see them, please REGISTER or LOGINQuote from: Fifth Amendment, US constitutionNo person shall be [...] compelled in any criminal case to be a witness against himself...I doubt the RIPA would hold up to scrutiny in the USA. And, since the prohibition against self incrimination clause is in the constitution, it couldn't be changed without a new amendment to the constitution which is unlikely.As far as primes, if your entire key is based on a one in a billion chance, it could be cracked in about a second. However, if you required several primes, then you may be able to multiply that out (billion)^{n} decryption steps for a unique set of n prime keys, as long as the keys could not be uniquely sequentially decrypted, which would put you back at the order n*(billion), and back to about a second for the decryption for small values of n.The trick, of course, is making sure your password, key, whatever is protected. Some encryption algorithms are supposed to be one-way. For example UNIX encrypted passwords. Keep the encrypted password, and probe the password table with a newly encrypted password. However, that may not in fact be the case.

No person shall be [...] compelled in any criminal case to be a witness against himself...

Security agencies had worked with implementers of the standard to weaken the implementation of the encryption

BlackBerry software uses only one PBKDF2 iteration, thus not taking advantage of the key security features of PBKDF2. By contrast, according to Katalov, Apple's iOS 3 uses 2,000 iterations and iOS 4 uses 10,000

Computers at each end of the session pick their own prime numbers at random, rather than download them, so they can't be directly snooped by a third party. The numbers from each end of the conversation are then combined in such a way that a snooper does not see either prime number in unencrypted form. It is impractical (with current published technology) to factor a product of large primes, or even to definitively prove that a given number really is prime. So your home computer and network servers typically uses a method like this:Create/lookup a table of the first million prime numbers (these are no secret)Generate a really big random numberTry dividing the really big number by each of the million prime numbers. If it is a multiple, go back to step 2There is a "...sorry, you cannot view external links. To see them, please REGISTER or LOGIN" test, which does not prove that a number is prime, but gives a high confidence that it is prime (eg failure rate of 1 in 1 billion). Run this 50 times; if it fails, go to step 2. When you reach this point, you have a large number which is almost certainly prime.

Unfortunately, I don't think this is enough to persuade your average would-be terrorist to get a real job...

Note: Quantum methods potentially provide breakthrough methods in factoring large numbers, but this field has fallen rather silent after publishing the factors of 15 and 21. There are undoubtedly many teams working on it.