BBS/nsa surv: Difference between revisions

From KB42
Politics BBS Archive
 
No edit summary
Line 1: Line 1:
[[Category:BBS]]
[[Category:Politics]]
{{Infobox BBS
{{Infobox BBS
| image        = Archived-En.png
| image        = Category NSA.png
| image2        = Archived-En.png
| file          = nsa_surv.txt
| file          = nsa_surv.txt
| author        = Unknown
| author        = Unknown
Line 14: Line 11:
}}
}}


<pre>
 




Line 50: Line 47:
developed).
developed).


Books to read: The Digital Encryption Standard
Books to read:
Cipher Systems
* The Digital Encryption Standard
Inside the Puzzle Palace
* Cipher Systems
* Inside the Puzzle Palace


Just thought I'd bring home some of the cyberpunk aspects of the world we
Just thought I'd bring home some of the cyberpunk aspects of the world we
Line 83: Line 81:




</pre>
[[Category:BBS]]
[[Category:Politics]]
[[Category:Government]]
[[Category:Government Agencies]]
[[Category:NSA]]

Revision as of 00:25, 2 January 2026

BBS/nsa surv
File Name: nsa_surv.txt
Author: Unknown
Date: Unknown
Posting BBS: Unknown
Key Words: Politics



From: c3q@vax5.cit.cornell.edu Newsgroups: alt.cyberpunk Subject: the NSA KNOWS... Date: 6 Dec 91 15:54:13 GMT Organization: Cornell University

I've been doing some research on data encryption lately, and was led inevitably to the Data Encryption Standard (DES). As originally proposed in the '70's (I think) the DES had a 128 bit key, and 8 code boxes. The NSA did IBM (the originators of the algorithm) a favor by rewriting the code boxes to make them "better" (slight cynicism on my part) and then said "might as well reduce the key to 64 bits, now that the boxes are so strong". Researchers at Stanford have noted mysterious patterns within the code boxes that might be a mathematical back-door into breaking the code. In the DES standard there is also the proviso that highly classified military, etc. data may/should be classified in some other way.

Point 2: In a study of the NSA it was revealed that the NSA owns land next to every major microwave relay route and down-link inside the US. With the scattering inherent in micro-links, this gives them access to 90+% of all data traffic.

Point 3: The NSA measures its computing power in acres (no joke). They are the leading purchaser of latest generation Crays.

Conclusion: The NSA can and does read our mail, encrypted or not.

Caveat: There is so much data flow, that even with filters that pull out only those messages encluding certain key words, any human operators would still be incapable of reading any realistic proportion of our mail. Just hope that expert systems designed for mail reading aren't developed soon (or haven't been developed).

Books to read:

  • The Digital Encryption Standard
  • Cipher Systems
  • Inside the Puzzle Palace

Just thought I'd bring home some of the cyberpunk aspects of the world we currently live in.

Travis J.I. Corcoran Cornell '92/'92 (??) Newsgroups: alt.cyberpunk From: ebrandt@jarthur.claremont.edu (Eli Brandt) Subject: Re: the NSA KNOWS... Organization: Cult of Loud Loud Sibelius Date: Sat, 7 Dec 1991 08:41:46 GMT

In article <164CCD625.M14661@mwvm.mitre.org> M14661@mwvm.mitre.org writes:

>Good points, but does anyone know how the RSA public key algorithm is >holding up? It's slow, but fine for precoding email messages, at least

It seems to be secure as long as you pick big enough primes -- remembering that the NSA has CPU we can only dream of. I strongly suspect that the NSA can crack DES. If they can break RSA with considered-secure primes, it almost certainly takes them much compute, and they would not be expending this kind of effort on *our* messages. I believe PGP, a PC RSA implementation, is still available from garbo.uwasa.fi; US users are kindly requested to refrain from downloading except for research purposes. It uses math owned by PKP, you see.

  Eli   ebrandt@jarthur.claremont.edu