[Beowulf] Re: "hobbyists"
Vincent Diepeveen
diep at xs4all.nl
Wed Jun 18 18:35:21 PDT 2008
USA and allowing encryption beyond the cracking capabilities of a 1st
year computer science student... ...hmmm
I remember how i did do big efforts to get vista ultimate bitlocker
to work.
On paper it sounds ok. AES 256 bits CBC.
The idea is : your usb stick has the encryption key and only that
thing has it.
So no one can decrypt the partition without that usb stick.
In case you forget to load that usb stick having the encryption key,
there is a general manner to unlock the machine by feeding it a long
code.
Looks great isn't it?
So far the paper...
But now the usual bug; the implementation that practical was allowed
by one those guys on the Perry-Sport mailing list.
Of course we don't want to tire ourselves too much typing too long
unlock codes...
That unlock code, stored at a different USB stick is 48 digits.
By the way 48 digits is how many bits?
Right, that's less than 48 * (log 10/log 2) = 160 bits.
So the problem for our first year student has been brought back from
256 to 160 bits already.
Not that it is a hobby mine, but one day i rebooted the machine and
had forgotten to put in the USB encryption stick.
By accident i mistyped the key. Windows then told me:
"you made a mistake somewhere in those 5 digits of the 48 digit
key, please retype them".
Doh.
So my guess is that soon i do not need to worry when by accident i
lose that USB stick...
Vincent
</EOF rant>
On Jun 19, 2008, at 2:41 AM, Perry E. Metzger wrote:
>
> Jim Lux <James.P.Lux at jpl.nasa.gov> writes:
>> In general, fundamental research is not subject to export
>> controls, so
>> if you frame your problem in terms of abstract mathematical problems,
>> you're not going to be treading on any toes. However, start
>> distributing it as "Jim Lux's superduper encryptor/password cracker,
>> now with 1024 bit capability!" and it's moved from fundamental
>> research to a product.
>
> Under current rules, provided it is open source or generally available
> to any buyer, you can distribute and export cryptographic code quite
> freely. There are some minimal reporting requirements, but they're
> barely worth mentioning.
>
> That's the reason you can freely distribute things like Kerberos,
> OpenSSL, pgp/gpg, etc.
>
>
> Perry
> --
> Perry E. Metzger perry at piermont.com
More information about the Beowulf
mailing list