0 Members and 1 Guest are viewing this topic.
... When you realise how futile it is to try to communicate privately, the only sensible thing for any terrorist or criminal to do is give up and go and live a normal life instead.
Part 3 of the Regulation of Investigatory Powers Act 2000 gives the police powers to order the disclosure of encryption keys, or force suspects to decrypt encrypted data. Anyone who refuses to hand over a key to the police would face up to two years' imprisonment. Under current anti-terrorism legislation, terrorist suspects now face up to five years for withholding keys.
The terms of the RIPA , (Regulation of Investigatory Powers Act), suggest that UK government cannot crack all encryption ... Quote from: openrightsgroup.orgPart 3 of the Regulation of Investigatory Powers Act 2000 gives the police powers to order the disclosure of encryption keys, or force suspects to decrypt encrypted data. Anyone who refuses to hand over a key to the police would face up to two years' imprisonment. Under current anti-terrorism legislation, terrorist suspects now face up to five years for withholding keys. https://wiki.openrightsgroup.org/wiki/Regulation_of_Investigatory_Powers_Act_2000/Part_III
No person shall be [...] compelled in any criminal case to be a witness against himself...
Security agencies had worked with implementers of the standard to weaken the implementation of the encryption
BlackBerry software uses only one PBKDF2 iteration, thus not taking advantage of the key security features of PBKDF2. By contrast, according to Katalov, Apple's iOS 3 uses 2,000 iterations and iOS 4 uses 10,000
Computers at each end of the session pick their own prime numbers at random, rather than download them, so they can't be directly snooped by a third party. The numbers from each end of the conversation are then combined in such a way that a snooper does not see either prime number in unencrypted form. It is impractical (with current published technology) to factor a product of large primes, or even to definitively prove that a given number really is prime. So your home computer and network servers typically uses a method like this:Create/lookup a table of the first million prime numbers (these are no secret)Generate a really big random numberTry dividing the really big number by each of the million prime numbers. If it is a multiple, go back to step 2There is a "pseudo-primality" test, which does not prove that a number is prime, but gives a high confidence that it is prime (eg failure rate of 1 in 1 billion). Run this 50 times; if it fails, go to step 2. When you reach this point, you have a large number which is almost certainly prime.
Unfortunately, I don't think this is enough to persuade your average would-be terrorist to get a real job...
Note: Quantum methods potentially provide breakthrough methods in factoring large numbers, but this field has fallen rather silent after publishing the factors of 15 and 21. There are undoubtedly many teams working on it.